Lenin alevski πŸ•΅οΈπŸ’»

@alevsk@infosec.exchange
340 Followers
92 Following
237 Posts
#security Eng @google β™₯️ To Build and Break Stuff. Wannabe #Hacker. Personal opinions, review my PR please
Bloghttps://www.alevsk.com
PGP/MIT0x67BA54C7DE3DD14A
Linkhttps://linktr.ee/alevsk
Twitterhttps://twitter.com/alevsk

New Open-Source Tool Spotlight 🚨🚨🚨

Recog is an open-source framework for identifying products, services, OSes & hardware using XML-based fingerprints. Match data from banners, cookies, TLS, and more with tools in Ruby, Java, and Go. Ideal for network probes & protocol analysis. #Cybersecurity #OpenSource

πŸ”— Project link on #GitHub πŸ‘‰ https://github.com/rapid7/recog

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

@Duckbill4994 thanks for sharing, I’ll give it a try

New Open-Source Tool Spotlight 🚨🚨🚨

Kubeshark brings Wireshark-like functionality to Kubernetes, capturing real-time protocol-level traffic across pods, nodes, and clusters. Think API observability at scale with support for Helm and Homebrew. #Kubernetes #DevOps

πŸ”— Project link on #GitHub πŸ‘‰ https://github.com/kubeshark/kubeshark

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

New Open-Source Tool Spotlight 🚨🚨🚨

Threat Designer by AWS uses Generative AI to automate threat modeling for secure system design. It leverages services like AWS Lambda, Amplify, and DynamoDB to analyze architectures, detect threats, and streamline security workflows. #cybersecurity #AI

πŸ”— Project link on #GitHub πŸ‘‰ https://github.com/awslabs/threat-designer

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

New Open-Source Tool Spotlight 🚨🚨🚨

Nosey Parker is like a precision `grep` for secrets. It scans files, directories, Git histories, and GitHub repos, using 186 regex patterns to detect sensitive info with high accuracy. Outputs are deduplicated to reduce noise, and it scales up to 20TB inputs at GB/s speeds. #CyberSecurity #OpenSource

πŸ”— Project link on #GitHub πŸ‘‰ https://github.com/praetorian-inc/noseyparker

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

New Open-Source Tool Spotlight 🚨🚨🚨

A Rust-powered Windows kernel rootkit, **shadow-rs**, blends advanced system manipulation with Rust's safety principles. Features include process hiding, privilege elevation, callback management, and more. For research/education. 🌐 #RustLang #KernelDevelopment

πŸ”— Project link on #GitHub πŸ‘‰ https://github.com/joaoviictorti/shadow-rs

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

New Open-Source Tool Spotlight 🚨🚨🚨

PurpleLab offers a fully deployable cybersecurity lab with a web-based UI. Includes Windows Server 2019 sandbox, detection rule management, and MITRE ATT&CK integration. Ideal for testing detection rules or simulating attacks. #Cybersecurity #DevSecOps

πŸ”— Project link on #GitHub πŸ‘‰ https://github.com/Krook9d/PurpleLab

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

New Open-Source Tool Spotlight 🚨🚨🚨

Transform any URL into an LLM-ready input with `Reader`. Just prefix the URL with `https://r.jina.ai/` for clean, readable content extraction. Perfect for enhancing agents & RAG pipelines. #LLM #NLP

Need web search results for your LLM? Prepend queries with `https://s.jina.ai/` to fetch top resultsβ€”content included. E.g., `https://s.jina.ai/your+query` brings knowledge directly to your model. #AItools #DataEngineering

Reader API now supports images! Captions are auto-generated for images missing alt tags, giving LLMs better context for reasoning and summarizing multimedia pages. #MachineLearning #AI

πŸ”— Project link on #GitHub πŸ‘‰ https://github.com/jina-ai/reader

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

New Open-Source Tool Spotlight 🚨🚨🚨

Using Microsoft Teams as a C2 channel? Meet convoC2. It embeds commands in hidden span tags and extracts outputs from Adaptive Card image URLs. Detection is toughβ€”Teams logs aren’t antivirus-friendly. #CyberSecurity #RedTeam

πŸ”— Project link on #GitHub πŸ‘‰ https://github.com/cxnturi0n/convoC2

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

β€” ✨
πŸ” P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking πŸ’»πŸ΄β€β˜ οΈ

Γ—

I finally wrapped up a project that had been on my mind for over a year.

Introducing RBAC ATLAS - πŸ”— https://rbac-atlas.github.io

RBAC ATLAS is a curated database of identities and the Role-Based Access Control (RBAC) policies tied to them in popular Kubernetes open-source projects. Each entry includes security annotations that highlight granted permissions, potential risks, and possible abuse scenarios (inspired by classics like GTFOBins and LOLBAS).

Why does RBAC matter?

RBAC is the last line of defense in Kubernetes security. If a workload gets compromised and an identity is stolen, a misconfigured or overly permissive RBAC policy (often seen with Operators) can let an attacker move laterally through the cluster β€” potentially leading to a full takeover. Alongside RBAC ATLAS, I’ve also been working on a tool called RBAC Scope β€” a static analyzer that checks RBAC policies against 100+ rules to flag risks and abuse scenarios. It’s built to be flexible and open for contributions, so the community can create their own rules. I’ll be releasing that project soon as well!

In the meantime, if you're curious to learn more β€” or want to invite me to speak at your conference β€” feel free to reach out. I’ll be talking about these tools at the Red Team Village during DEFCON 33.