ahrixia

Kubernetes Enumeration Tools for Penetration Testing - K8s security assessment scripts for red team operations

12
0
100% credibility
Found Feb 05, 2026 at 10 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Shell
AI Summary

A pair of bash scripts that perform security audits on Kubernetes clusters to detect misconfigurations and privilege escalation opportunities with color-coded, user-friendly output for penetration testers.

How It Works

1
🔍 Discover the safety checker

You find this helpful tool online that scans computer clusters for hidden security weaknesses, perfect for keeping things safe during tests.

2
📥 Get the checker files

You download the simple checking scripts to your computer or directly into the test environment.

3
Choose your starting point
🏠
Check from outside

Use the main checker with your permission file to scan the whole setup.

🏢
Check from inside

Run the inner checker right from within a compromised test computer.

4
▶️ Start the scan

Run the chosen checker and let it explore permissions, hidden spots, and weak points automatically.

5
🌈 Spot the dangers

Watch colorful highlights pop up—red for urgent fixes, yellow for watch-outs, green for all clear—making issues easy to spot and act on.

Strengthen your setup

With the clear report of vulnerabilities and tips, you now know exactly what to patch for a much safer cluster.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 10 to 12 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is k8s-enum.sh?

k8s-enum.sh is a Kubernetes enumeration tool built in Bash for penetration testing and red team operations. It runs security assessments on k8s clusters, spotting misconfigurations and privilege escalation paths via kubernetes api enumeration—either externally with a kubeconfig file or internally from a compromised pod using kubernetes pod enumeration. You get color-coded output like LinPEAS, highlighting critical issues such as dangerous RBAC permissions, exposed secrets, and container escape vectors.

Why is it gaining traction?

It stands out with actionable tips next to findings, like exact kubectl commands for exploiting pods/exec or impersonation, plus checks for cloud metadata in AWS/GCP/Azure. No need for full kubectl in pods—it falls back to direct API calls—and flags high-risk perms like secrets access or cronjob creation. Developers grab it from kubernetes enumeration github repos for quick k8s assessment during ops.

Who should use this?

Red teamers and pentesters evaluating stolen kubeconfigs or pivoting from compromised pods in kubernetes environments. Security researchers prepping kubernetes github actions runners or ingress setups for audits. Ideal for k8s ops where you need fast enum.sh-style output on RBAC, services, and privesc chains.

Verdict

Grab it if you're doing k8s pentests—solid docs and MIT license make it easy to drop into workflows, despite low 11 stars and 1.0% credibility score signaling early maturity. Test thoroughly on your own clusters first; it's a handy starter for kubernetes repository github tools but lacks battle-tested releases.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.