{"id":12600,"date":"2021-04-30T11:11:52","date_gmt":"2021-04-30T05:41:52","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=12600"},"modified":"2021-04-30T11:11:52","modified_gmt":"2021-04-30T05:41:52","slug":"kubesploit","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/kubesploit\/","title":{"rendered":"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command"},"content":{"rendered":"\n<p><strong>Kubesploit<\/strong> is a cross-platform post-exploitation HTTP\/2 Command &amp; Control server and agent dedicated for containerized environments written in Golang and built on top of <a href=\"https:\/\/github.com\/Ne0nd0g\/merlin\">Merlin<\/a> project by <a href=\"https:\/\/github.com\/Ne0nd0g\">Russel Van Tuyl (@Ne0nd0g)<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Our Motivation<\/strong><\/p>\n\n\n\n<p>While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage.<br>They might allow you to see the problem but not exploit it. It is important to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network.<br>When running an exploit, it will practice the organization&#8217;s cyber event management, which doesn&#8217;t happen when scanning for cluster issues.<br>It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made.<br>We wanted to create an offensive tool that will meet these requirements.<\/p>\n\n\n\n<p>But we had another reason to create such a tool. We already had two open-source tools (<a href=\"https:\/\/github.com\/cyberark\/KubiScan\">KubiScan<\/a> and <a href=\"https:\/\/github.com\/cyberark\/kubeletctl\">kubeletctl<\/a>) related to Kubernetes, and we had an idea for more. Instead of creating a project for each one, we thought it could be better to make a new tool that will centralize the new tools, and this is when Kubesploit was created.<\/p>\n\n\n\n<p>We searched for an open-source that provide that heavy lifting for a cross-platform system, and we found <a href=\"https:\/\/github.com\/Ne0nd0g\/merlin\">Merlin<\/a>, written by <a href=\"https:\/\/github.com\/Ne0nd0g\">Russel Van Tuyl (@Ne0nd0g)<\/a>, to be suitable for us.<\/p>\n\n\n\n<p>Our main goal is to contribute to raising awareness about the security of containerized environments, and improve the mitigations implemented in the various networks. All of this captured through a framework that provides the appropriate tools for the job of PT teams and Red Teamers during their activities in these environments. Using these tools will help you estimate these environments&#8217; strengths and make the required changes to protect them.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>What&#8217;s New?<\/strong><\/p>\n\n\n\n<p>As the C&amp;C and the agent infrastructure were done already by <a href=\"https:\/\/github.com\/Ne0nd0g\/merlin\">Merlin<\/a>, we integrated <a href=\"https:\/\/github.com\/traefik\/yaegi\">Go interpreter (&#8220;Yaegi&#8221;)<\/a> to be able to run Golang code from the server to the agent.<br>It allowed us to write our modules in Golang, provide more flexibility on the modules, and dynamically load new modules. It is an ongoing project, and we are planning to add more modules related to Docker and Kubernetes in the future.<\/p>\n\n\n\n<p>The currently available modules are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Container breakout using mounting<\/li><li>Container breakout using docker.sock<\/li><li>Container breakout using CVE-2019-5736 exploit<\/li><li>Scan for Kubernetes cluster known CVEs<\/li><li>Port scanning with focus on Kubernetes services<\/li><li>Kubernetes service scan from within the container<\/li><li>Light <a href=\"https:\/\/github.com\/cyberark\/kubeletctl\">kubeletctl<\/a> containing the following options:<ul><li>Scan for containers with RCE<\/li><li>Scan for Pods and containers<\/li><li>Scan for tokens from all available containers<\/li><li>Run command with multiple options<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Quick Start<\/strong><\/p>\n\n\n\n<p>We created a dedicated <a href=\"https:\/\/www.katacoda.com\/cyberarkcommons\/scenarios\/kubesploit\">Kubernetes environment in Katacoda<\/a> for you to experiment with Kubesploit.<br>It\u2019s a full simulation with a complete set of automated instructions on how to use Kubesploit. We encourage you to explore it.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Build<\/strong><\/p>\n\n\n\n<p>To build this project, run the <code>make<\/code> command from the root folder.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Quick Build<\/strong><\/p>\n\n\n\n<p>To run quick build for Linux, you can run the following:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>export PATH=$PATH:\/usr\/local\/go\/bin <br>go build -o agent cmd\/merlinagent\/main.go <br>go build -o server cmd\/merlinserver\/main.go <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Mitigations<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>YARA rules<\/strong><\/p>\n\n\n\n<p>We created YARA rules that will help to catch Kubesploit binaries. The rules are written in the file <code>kubesploit.yara<\/code>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>Agent Recording<\/strong><\/p>\n\n\n\n<p>Every Go module loaded to the agent is being recorded inside the victim machine.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>MITRE map<\/strong><\/p>\n\n\n\n<p>We created a MITRE map of the vectors attack being used by Kubesploit.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-f_Yn_V7vvdw\/YIkzi0J6JlI\/AAAAAAAAI4o\/2JF5pCaPIVI87oTdoTcZrN99qTWnmJ_cACLcBGAsYHQ\/s1864\/Kubesploit-4.png\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/cyberark\/kubesploit\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kubesploit is a cross-platform post-exploitation HTTP\/2 Command &amp; Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl (@Ne0nd0g). Our Motivation While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16784,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png","fifu_image_alt":"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-12600","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command<\/title>\n<meta name=\"description\" content=\"Kubesploit is a cross-platform post-exploitation HTTP\/2 Command &amp; Control server and agent dedicated for containerized environments written in Golang\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/kubesploit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command\" \/>\n<meta property=\"og:description\" content=\"Kubesploit is a cross-platform post-exploitation HTTP\/2 Command &amp; Control server and agent dedicated for containerized environments written in Golang\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/kubesploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-30T05:41:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command\",\"datePublished\":\"2021-04-30T05:41:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/\"},\"wordCount\":618,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png\",\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/\",\"name\":\"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png\",\"datePublished\":\"2021-04-30T05:41:52+00:00\",\"description\":\"Kubesploit is a cross-platform post-exploitation HTTP\/2 Command & Control server and agent dedicated for containerized environments written in Golang\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/kubesploit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kubesploit\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command","description":"Kubesploit is a cross-platform post-exploitation HTTP\/2 Command & Control server and agent dedicated for containerized environments written in Golang","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/kubesploit\/","og_locale":"en_US","og_type":"article","og_title":"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command","og_description":"Kubesploit is a cross-platform post-exploitation HTTP\/2 Command & Control server and agent dedicated for containerized environments written in Golang","og_url":"https:\/\/kalilinuxtutorials.com\/kubesploit\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-04-30T05:41:52+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/kubesploit\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/kubesploit\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command","datePublished":"2021-04-30T05:41:52+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kubesploit\/"},"wordCount":618,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kubesploit\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png","articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/kubesploit\/","url":"https:\/\/kalilinuxtutorials.com\/kubesploit\/","name":"Kubesploit : A Cross-Platform Post-Exploitation HTTP\/2 Command","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kubesploit\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kubesploit\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png","datePublished":"2021-04-30T05:41:52+00:00","description":"Kubesploit is a cross-platform post-exploitation HTTP\/2 Command & Control server and agent dedicated for containerized environments written in Golang","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/kubesploit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/kubesploit\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-jHNPWMZgYPA\/YIiLN7Du3vI\/AAAAAAAAI34\/RhUBw_p1Oasqi5Yodad1xcwsSvjtoqdsQCLcBGAsYHQ\/s728\/Kubesploit-1.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":30608,"url":"https:\/\/kalilinuxtutorials.com\/awesome-command-and-control\/","url_meta":{"origin":12600,"position":0},"title":"Awesome Command And Control","author":"Varshini","date":"October 4, 2023","format":false,"excerpt":"A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to\u00a0contribute\u00a0to this list, simply open a PR with your additions. Maintained by\u00a0@tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7694,"url":"https:\/\/kalilinuxtutorials.com\/exploitivator-metasploit-scanning-exploitation\/","url_meta":{"origin":12600,"position":1},"title":"Exploitivator : Automate Metasploit Scanning And Exploitation","author":"R K","date":"December 16, 2019","format":false,"excerpt":"Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the msfrpc module for Python, described in detail here: https:\/\/www.trustwave.com\/Resources\/SpiderLabs-Blog\/Scripting-Metasploit-using-MSGRPC\/ Install the necessary Kali packages and the PostgreSQL gem for Ruby: apt-get install postgresql libpq-dev git-core gem install pg Install current version\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36864,"url":"https:\/\/kalilinuxtutorials.com\/comdotnetexploit\/","url_meta":{"origin":12600,"position":2},"title":"ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)","author":"Varshini","date":"March 6, 2025","format":false,"excerpt":"ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. PPL is a security feature introduced in Windows 8.1 to protect critical processes like LSASS from unauthorized access or modification. T\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/ComDotNetExploit.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/ComDotNetExploit.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/ComDotNetExploit.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/ComDotNetExploit.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/ComDotNetExploit.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/ComDotNetExploit.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":12668,"url":"https:\/\/kalilinuxtutorials.com\/posta\/","url_meta":{"origin":12600,"position":3},"title":"Posta : Cross-document Messaging Security Research Tool","author":"R K","date":"May 6, 2021","format":false,"excerpt":"Posta\u00a0is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit\u00a0postMessage\u00a0vulnerabilities, and includes features such as replaying messages sent between windows within any attached browser. Prerequisites Google Chrome \/ ChromiumNode.js\u00a0(optional) Installation Development Environment Run\u00a0Posta\u00a0in a full development environment with a dedicated browser (Chromium): Install\u00a0Posta git\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35055,"url":"https:\/\/kalilinuxtutorials.com\/metasploit-for-penetration-testing\/","url_meta":{"origin":12600,"position":4},"title":"Metasploit for Penetration Testing and Exploitation &#8211; 2024","author":"Rajashekar Yasani","date":"August 7, 2024","format":false,"excerpt":"Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to discover vulnerabilities, exploit them, and assess the security posture of systems. This guide will walk you through the installation process, working methods, and provide examples of how to use Metasploit\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":7875,"url":"https:\/\/kalilinuxtutorials.com\/pakuri-penetration-test-achieve-knowledge-unite-rapid-interface\/","url_meta":{"origin":12600,"position":5},"title":"PAKURI : Penetration Test Achieve Knowledge Unite Rapid Interface","author":"R K","date":"December 29, 2019","format":false,"excerpt":"Pakuri is a Penetration test Achieve Knowledge Unite Rapid Interface. Pentesters love to move their hands. However, I do not like troublesome work. Simple work is performed semi-automatically with simple operations. It executes commands frequently used in penetration tests by simply operating the numeric keypad. You can test penetration as\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=12600"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12600\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16784"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=12600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=12600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=12600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}