Kubesploit Logo

Kubesploit

0
Free
Visit Website

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl (@Ne0nd0g). Our Motivation While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is important to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network. When running an exploit, it will practice the organization's cyber event management, which doesn't happen when scanning for cluster issues. It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made. We wanted to create an offensive tool that will meet these requirements. But we had another reason to create such a tool. We already had two open-source tools (KubiScan and kubeletctl) related to Kubernetes, and we had an idea for more.

FEATURES

ALTERNATIVES

Sublist3r is a python tool for enumerating subdomains using OSINT and various search engines.

A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

A tool for Local File Inclusion (LFI) exploitation and scanning

A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.

APT Simulator is a tool for simulating a compromised system on Windows.

Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.

A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.

A cross-platform web fuzzer written in Nim

PINNED