Cloud_Unauthorized_Tool
Cloud_Unauthorized_Tool copied to clipboard
A tool designed to detect and exploit unauthorized access in various services. It supports the following functionalities
README.md
🌩️ Cloud_Unauthorized_tool
English | 简体中文
Introduction
Cloud_Unauthorized_tool is a powerful utility crafted to identify and leverage unauthorized access across various services. It equips security enthusiasts and professionals with the means to detect and exploit vulnerabilities in cloud environments. The tool stands out with its support for multiple exploitation techniques, setting it apart from conventional vulnerability scanners.
Key Features
- Docker API Exploitation: Detect and exploit unauthorized access to the Docker API, creating privileged containers.
- Kubernetes Dashboard Exploits: Exploit the Kubernetes Dashboard to spawn containers and execute reverse shell commands.
- etcd Token Retrieval: Extract tokens from etcd, facilitating control over Kubernetes clusters.
- Kubernetes API Server Exploits: Exploit unauthorized access to the Kubernetes API Server, enabling control over namespaces.
Key Differentiator
Compared to kube-hunter, Cloud_Unauthorized_tool doesn't just stop at proof-of-concept (POC) attacks. It empowers users to execute real exploits, making it a formidable tool in the hands of security experts.
Installation
Requirements
- Go 1.16 or higher
Steps
- Clone the repository:
git clone https://github.com/cdxiaodong/Cloud_Unauthorized_tool.git cd Cloud_Unauthorized_tool - Build the project:
go build -o Cloud_Unauthorized_tool - Run the tool:
./Cloud_Unauthorized_tool
Example Usage
Contributing
Contributions are welcome! Feel free to report issues or submit pull requests to enhance the tool's capabilities.
License
This project is licensed under the MIT License. For more details, refer to the LICENSE file.
🗨️ Contacts: Email: [email protected] Website: cdxiaodong.life