Kubesploit Logo

Kubesploit

0
Free
Visit Website

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl (@Ne0nd0g). Our Motivation While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is important to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network. When running an exploit, it will practice the organization's cyber event management, which doesn't happen when scanning for cluster issues. It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made. We wanted to create an offensive tool that will meet these requirements. But we had another reason to create such a tool. We already had two open-source tools (KubiScan and kubeletctl) related to Kubernetes, and we had an idea for more.

FEATURES

ALTERNATIVES

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

Python-based toolkit for network hacking with various implemented techniques and supported by Securetia SRL.

A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.

Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

A tool for interacting with the MSBuild API, enabling malicious activities and evading detection.

A script to enumerate Google Storage buckets and determine access and privilege escalation

A tool that simplifies the installation of tools and configuration for Kali Linux

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved