kubesploit
Exploit toolkit
A cross-platform post-exploitation toolset for containerized environments
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
1k stars
29 watching
115 forks
Language: Go
last commit: 9 months ago
Linked from 3 awesome lists
agentc2command-and-controlcontainersgolanghttp2kubernetespenetration-testing-frameworkpenetration-testing-toolspost-exploitationred-teamsredteam-toolssecuritysecurity-tools
Related projects:
Repository | Description | Stars |
---|---|---|
| A command-line tool for interacting with the Kubernetes kubelet API | 749 |
| A tool designed to manipulate and control Kubernetes clusters after initial penetration and privilege escalation. | 281 |
| Automates the identification of risky permissions in Kubernetes clusters. | 1,329 |
| A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems | 543 |
| Analyzes Kubernetes resources for security vulnerabilities | 1,255 |
| A Kubernetes-focused container assessment and context discovery tool for penetration testing. | 441 |
| A tool designed to exploit public cloud provider approaches to gain privileged access to Kubernetes clusters by abusing kubelet credentials. | 160 |
| A collection of post-exploitation tools and scripts for various operating systems. | 1,555 |
| Scans Kubernetes resources for security vulnerabilities using kubesec.io | 510 |
| Demonstrates an escape vulnerability in Kubernetes allowing privileged access to a pod through symlinks | 35 |
| A toolkit for utilizing Tor network for various exploitation and post-exploitation tasks. | 59 |
| A kubectl plugin that provides a way to work with network policies in Kubernetes clusters | 29 |
| Provides a tool to inspect and view details of pods on Kubernetes nodes | 58 |
| Tool to duplicate Kubernetes resources with customized commands and configurations. | 37 |
| A Rust framework providing implants and tools for command-and-control operations in penetration testing | 565 |