README.md
English | 简体中文
Cloud_Unauthorized_tool
is a powerful utility crafted to identify and leverage unauthorized access across various services. It equips security enthusiasts and professionals with the means to detect and exploit vulnerabilities in cloud environments. The tool stands out with its support for multiple exploitation techniques, setting it apart from conventional vulnerability scanners.
- Docker API Exploitation: Detect and exploit unauthorized access to the Docker API, creating privileged containers.
- Kubernetes Dashboard Exploits: Exploit the Kubernetes Dashboard to spawn containers and execute reverse shell commands.
- etcd Token Retrieval: Extract tokens from etcd, facilitating control over Kubernetes clusters.
- Kubernetes API Server Exploits: Exploit unauthorized access to the Kubernetes API Server, enabling control over namespaces.
Compared to kube-hunter, Cloud_Unauthorized_tool
doesn't just stop at proof-of-concept (POC) attacks. It empowers users to execute real exploits, making it a formidable tool in the hands of security experts.
- Go 1.16 or higher
- Clone the repository:
git clone https://github.com/cdxiaodong/Cloud_Unauthorized_tool.git cd Cloud_Unauthorized_tool
- Build the project:
go build -o Cloud_Unauthorized_tool
- Run the tool:
./Cloud_Unauthorized_tool
Contributions are welcome! Feel free to report issues or submit pull requests to enhance the tool's capabilities.
This project is licensed under the MIT License. For more details, refer to the LICENSE file.
🗨️ Contacts: Email: cdxiaodong@systemshell.org Website: cdxiaodong.life