Kubesploit Logo

Kubesploit

0
Free
Visit Website

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl (@Ne0nd0g). Our Motivation While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is important to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network. When running an exploit, it will practice the organization's cyber event management, which doesn't happen when scanning for cluster issues. It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made. We wanted to create an offensive tool that will meet these requirements. But we had another reason to create such a tool. We already had two open-source tools (KubiScan and kubeletctl) related to Kubernetes, and we had an idea for more.

FEATURES

ALTERNATIVES

A collection of scripts for Turbo Intruder, a penetration testing tool

Maintaining account persistence via XSS and Oauth

A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.

A collaborative, multi-platform, red teaming framework for simulating attacks and testing defenses.

Stealing Signatures and Making One Invalid Signature at a Time.

Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.