kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes environments. You should NOT run kube-hunter on a Kubernetes cluster that you don't own! Run kube-hunter: kube-hunter is available as a container (aquasec/kube-hunter), and we also offer a web site at kube-hunter.aquasec.com where you can register online to receive a token allowing you to see and share the results online. You can also run the Python code yourself as described below. Explore vulnerabilities: The kube-hunter knowledge base includes articles about discoverable vulnerabilities and issues. When kube-hunter reports an issue, it will show its VID (Vulnerability ID) so you can look it up in the KB at https://aquasecurity.github.io/kube-hunter/
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
A ruby script that scans for vulnerable 3rd-party web applications
Script to find exploits for vulnerable software packages on Linux systems using an exploit database.
An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.
Cloud-based service for testing and analyzing Android and iOS apps for malware, vulnerabilities, and security threats.
A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.