Skip to content
View r0binak's full-sized avatar
🗳️
kubectl auth can-i --list
🗳️
kubectl auth can-i --list

Block or report r0binak

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Epyon is a swiss army knife tool for pentesting DevOps ecosystems.

Go 89 7 Updated Mar 13, 2026

💰 Взлом проездных билетов наземного транспорта Москвы

22 Updated Jan 12, 2023

Collection of Cyber Threat Intelligence sources from the deep and dark web

6,793 1,140 Updated Apr 16, 2026

Workflow Engine for Kubernetes

Go 16,624 3,503 Updated Apr 18, 2026

Create honeypots for cloud environments

Python 114 12 Updated Oct 6, 2025

Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.

C 374 57 Updated Aug 29, 2025
C 33 4 Updated Aug 26, 2025

This project is designed to simulate GPU information, making it easier to test scenarios where a GPU is not available.

C++ 65 3 Updated Jan 9, 2026

CVE-2025-53547 one of poc code

9 Updated Jul 9, 2025

Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF

Python 56 10 Updated Jul 28, 2025

A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clusters.

Go 105 6 Updated May 20, 2025

io_uring based rootkit

Go 248 32 Updated Apr 24, 2025

IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - …

Go 92 14 Updated May 6, 2025

CVE-2025-1974

Python 90 29 Updated Apr 2, 2025

Free IDE for Kubernetes

TypeScript 4,894 225 Updated Apr 17, 2026

It's my solution for bugbounty automation

Python 24 1 Updated Apr 13, 2026

Document of Spider in the Pod - How to Penetrate Kubernetes with Low or No Privileges

10 Updated Feb 1, 2025

A penetration toolkit for container environment

C 128 23 Updated Apr 13, 2026
Python 87 3 Updated Mar 30, 2026

Validate the isolation posture of your container environment.

Rust 314 14 Updated Feb 11, 2026

A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.

Go 860 65 Updated Jan 5, 2026

Kubernetes Spec Explorer

TypeScript 615 44 Updated Mar 25, 2026

Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay infor…

Python 700 94 Updated Jan 6, 2026

GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.

YAML 12,924 1,556 Updated Apr 7, 2026

Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?

41 3 Updated Nov 16, 2025

HASH (HTTP Agnostic Software Honeypot)

JavaScript 141 8 Updated Apr 6, 2026

Powerful+Fast+Low Privilege Kubernetes discovery tools

Go 272 18 Updated Jul 29, 2025
Go 3 Updated Aug 13, 2024

#supply #chain #attack #detection

YARA 650 60 Updated Apr 17, 2026
Next