Releases: cyberark/kubesploit
Releases · cyberark/kubesploit
v0.1.3
- Update Docker server usage (#4 @aviadhahami)
- Fix bug with marshling: "Failed to print unexpected end of JSON input" (#5)
- Adding golang version pre-reqs from traefik/yaegi (#7 by @elreydetoda)
- Add colors to the vulnerability scan module (#9)
- New modules and new modifications (#8 by @yanivyakobovich)):
- cGroup Breakout module (JSON and source code).
- Kernel Module Breakout module (JSON and source code).
- Deepce module (JSON and source code).
- Vulnerability test module (JSON and source code).
- CODE_OF_CONDUCT.md
- Option to add sh/bash modules as source code modules.
- Adding features to kernel escape module and shellscript loading (#10)
- Bugfix (exec.go) and kernel module improvement (#11 )
- Remove
log.Fatal
from CVE scanner module
Build ID: fb4471b2ff18662c706e676a7f24c33168eb9456
The Server downloads contain a copy of all compiled agents in the data/bin directory
The compressed files have a password of
kubesploit
v0.1.2
v0.1.1
v0.1.0
New Features:
- Integration with Go Interpreter "Yaegi".
- Support Golang modules
- New
config.yaml
for automate configurations - Option to remove all agents with a single
all
command
New modules related to containers and Kubernetes:
- Container breakout using mounting
- Container breakout using docker.sock
- Container breakout using CVE-2019-5736 exploit
- Scan for Kubernetes cluster known CVEs
- Port scanning with focus on Kubernetes services
- Kubernetes service scan from within the container
- Light kubeletctl containing the following options:
- Scan for containers with RCE
- Scan for Pods and containers
- Scan for tokens from all available containers
- Run command with multiple options
Build ID: 526911f8cd6c6377bbc62ebabc7a7753ac8ea799
The Server downloads contain a copy of all compiled agents in the data/bin directory
The compressed files have a password of
kubesploit