Skip to content

Releases: cyberark/kubesploit

v0.1.3

09 Feb 11:46
fb4471b
Compare
Choose a tag to compare
  • Update Docker server usage (#4 @aviadhahami)
  • Fix bug with marshling: "Failed to print unexpected end of JSON input" (#5)
  • Adding golang version pre-reqs from traefik/yaegi (#7 by @elreydetoda)
  • Add colors to the vulnerability scan module (#9)
  • New modules and new modifications (#8 by @yanivyakobovich)):
    • cGroup Breakout module (JSON and source code).
    • Kernel Module Breakout module (JSON and source code).
    • Deepce module (JSON and source code).
    • Vulnerability test module (JSON and source code).
    • CODE_OF_CONDUCT.md
    • Option to add sh/bash modules as source code modules.
  • Adding features to kernel escape module and shellscript loading (#10)
  • Bugfix (exec.go) and kernel module improvement (#11 )
  • Remove log.Fatal from CVE scanner module

Build ID: fb4471b2ff18662c706e676a7f24c33168eb9456

The Server downloads contain a copy of all compiled agents in the data/bin directory

The compressed files have a password of kubesploit

v0.1.2

20 Jun 12:47
039599a
Compare
Choose a tag to compare

The Server downloads contain a copy of all compiled agents in the data/bin directory
The compressed files have a password of kubesploit

v0.1.1

04 Apr 14:10
3e8ae77
Compare
Choose a tag to compare

Update after pull request #1:

  • Fix bug with parsing modules
  • Fix bug with mounting breakout module
  • Fix issue with Makefile

Build ID: 3e8ae77

The Server downloads contain a copy of all compiled agents in the data/bin directory
The compressed files have a password of kubesploit

v0.1.0

01 Apr 13:40
926a95a
Compare
Choose a tag to compare

New Features:

  • Integration with Go Interpreter "Yaegi".
  • Support Golang modules
  • New config.yaml for automate configurations
  • Option to remove all agents with a single all command

New modules related to containers and Kubernetes:

  • Container breakout using mounting
  • Container breakout using docker.sock
  • Container breakout using CVE-2019-5736 exploit
  • Scan for Kubernetes cluster known CVEs
  • Port scanning with focus on Kubernetes services
  • Kubernetes service scan from within the container
  • Light kubeletctl containing the following options:
    • Scan for containers with RCE
    • Scan for Pods and containers
    • Scan for tokens from all available containers
    • Run command with multiple options

Build ID: 526911f8cd6c6377bbc62ebabc7a7753ac8ea799

The Server downloads contain a copy of all compiled agents in the data/bin directory

The compressed files have a password of kubesploit