kdigger
kubesploit
kdigger | kubesploit | |
---|---|---|
3 | 23 | |
404 | 1,071 | |
2.2% | 0.2% | |
0.0 | 0.0 | |
over 1 year ago | about 1 year ago | |
Go | Go | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kdigger
kubesploit
-
Trends at Blackhat Asia 2022
Kubesploit
- 🔥🔥 A new version 0.1.3 released for Kubesploit: a post-exploitation framework for Kubernetes🔥🔥
-
New release of 🔥Kubesploit v0.1.3🔥
You can find it here: https://github.com/cyberark/kubesploit
- cyberark/kubesploit - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
- Kubesploit: Cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments.
- Kubesploit: A new cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments
- 🔥 Kubesploit: A new post-exploitation framework for Kubernetes and containers 🔥
What are some alternatives?
Telegrip - Telegrip is a digital forensic tool that provides acquistion and analysis for Telegram-related cases.
WeaponizeKali.sh - Automate installation of extra pentest tools on Kali Linux
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
ligolo-ng - An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
pwnppeteer
Modlishka - Modlishka. Reverse Proxy.
simwigo - Simwigo is a cross-platform tool, written in Go, to simplify the deployment of a web service.
packj - Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain
ThunderCloud - Cloud Exploit Framework
sliver - Adversary Emulation Framework
grype - A vulnerability scanner for container images and filesystems
combobulator - Dependency Combobulator