ratd
kubesploit
ratd | kubesploit | |
---|---|---|
1 | 23 | |
15 | 1,071 | |
- | 0.2% | |
0.0 | 0.0 | |
over 1 year ago | about 1 year ago | |
Go | Go | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ratd
-
Alternative to traditional RMM for Linux Monitoring and Management?
I don't have anything deliverable yet, but I'm working on an open source RMM. Maybe keep an eye out. https://github.com/ballresin/ratd
kubesploit
-
Trends at Blackhat Asia 2022
Kubesploit
- 🔥🔥 A new version 0.1.3 released for Kubesploit: a post-exploitation framework for Kubernetes🔥🔥
-
New release of 🔥Kubesploit v0.1.3🔥
You can find it here: https://github.com/cyberark/kubesploit
- cyberark/kubesploit - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
- Kubesploit: Cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments.
- Kubesploit: A new cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments
- 🔥 Kubesploit: A new post-exploitation framework for Kubernetes and containers 🔥
What are some alternatives?
WeaponizeKali.sh - Automate installation of extra pentest tools on Kali Linux
ligolo-ng - An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Modlishka - Modlishka. Reverse Proxy.
packj - Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain
sliver - Adversary Emulation Framework
combobulator - Dependency Combobulator
ThunderCloud - Cloud Exploit Framework
traitor - :arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
gitleaks - Protect and discover secrets using Gitleaks 🔑
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
pwnppeteer
Nimbo-C2 - Nimbo-C2 is yet another (simple and lightweight) C2 framework