- 🏞️
- in/r0binak
Highlights
Starred repositories
Collection of Cyber Threat Intelligence sources from the deep and dark web
Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.
This project is designed to simulate GPU information, making it easier to test scenarios where a GPU is not available.
Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF
A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clusters.
IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - …
Document of Spider in the Pod - How to Penetrate Kubernetes with Low or No Privileges
Validate the isolation posture of your container environment.
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay infor…
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?
Powerful+Fast+Low Privilege Kubernetes discovery tools
#differential #supply #chain #attack #detection
Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.
A collection of bypasses and exploits for eBPF-based cloud security.