kubesploit
ligolo-ng
kubesploit | ligolo-ng | |
---|---|---|
23 | 5 | |
1,071 | 2,160 | |
0.2% | 8.2% | |
0.0 | 5.8 | |
about 1 year ago | 9 days ago | |
Go | Go | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubesploit
-
Trends at Blackhat Asia 2022
Kubesploit
- 🔥🔥 A new version 0.1.3 released for Kubesploit: a post-exploitation framework for Kubernetes🔥🔥
-
New release of 🔥Kubesploit v0.1.3🔥
You can find it here: https://github.com/cyberark/kubesploit
- cyberark/kubesploit - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
- Kubesploit: Cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments.
- Kubesploit: A new cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments
- 🔥 Kubesploit: A new post-exploitation framework for Kubernetes and containers 🔥
ligolo-ng
-
Actual SSH over HTTPS
I learned about chisel in PEN-200 / preparing for the OSCP.
Then I learned about, Ligolo-ng [1] which is a game-changer. I highly recommend checking it out. It is most applicable to a penetration test. It uses TLS so I'm not sure it could be used to address the issue mentioned in the article.
[1] https://github.com/nicocha30/ligolo-ng
- Haven't been using kali in a long time and wanted to know why Ngrok is not working on Blackeye? blackeye itself doesn't exist anymore lol
- Ligolo-ng: IP tunneling via tun interface
- Ligolo-ng: An advanced, yet simple, tunneling tool that uses a TUN interface.
- ligolo-ng: An advanced, yet simple, tunneling tool that uses a TUN interface.
What are some alternatives?
WeaponizeKali.sh - Automate installation of extra pentest tools on Kali Linux
drago - ☁️ Securely connect anything with WireGuard® and manage all your networks from a single place.
Modlishka - Modlishka. Reverse Proxy.
Stowaway - 👻Stowaway -- Multi-hop Proxy Tool for pentesters
packj - Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain
merlin - Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
sliver - Adversary Emulation Framework
ToRat - ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
combobulator - Dependency Combobulator
HackBrowserData - Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
ThunderCloud - Cloud Exploit Framework
emp3r0r - Linux/Windows post-exploitation framework made by linux user