kinokopio

kinokopio / kctl

Public

Kubernetes Kubelet security assessment and privilege escalation toolkit

14
2
100% credibility
Found Feb 04, 2026 at 11 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Go
AI Summary

kctl is an interactive security auditing tool for Kubernetes environments that scans nodes, analyzes access permissions, and tests movement between workloads.

How It Works

1
🕵️ Discover kctl

You hear about a handy tool to check for weak spots in your cluster setup while reading security tips online.

2
📥 Grab the tool

Download the ready-to-use app that fits right into your test environment with a quick click.

3
🚀 Start the helper

Run the friendly control panel inside your setup, and it spots the main hub automatically.

4
🔍 Scan for risks

Watch it explore all the worker areas, spotting risky access passes and weak permissions in seconds.

5
📋 Review findings

See a clear list of high-risk spots, like powerful passes that could be trouble.

Strengthen your setup

Use the insights to lock down access and feel confident your cluster is safer now.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 11 to 14 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is kctl?

kctl is a Go-based interactive console for auditing Kubernetes security via the Kubelet API on port 10250 and API Server on 6443. It lets you discover exposed Kubelet endpoints, scan ServiceAccount tokens across pods for risky permissions like nodes/proxy GET, execute commands with exec or run, portforward, and map PIDs to pods—all from a single REPL. Download binaries from github kubernetes releases to simulate privilege escalation chains without leaving traces in audit logs.

Why is it gaining traction?

Unlike kubectl plugins or static scanners, kctl offers MSF-style interactivity with auto-detection inside pods, pulling gateway IPs and tokens seamlessly. Standout hooks include Golden Ticket forging for persistent admin certs/tokens using cluster CA keys, and exploiting kubelet-by-http flaws for RCE via nodes/proxy—features pentestors reference from real research. Its proxy support and concurrency-tuned scans make lateral movement in kubernetes github actions runner or ingress nginx setups feel fluid.

Who should use this?

Kubernetes security engineers simulating attacks on kubelet config exposures, red teamers chaining SA token theft to cluster-admin in multi-node clusters like those with kubernetes github container registry or github runner. Defenders validating defenses against kctl eurofins or railroad-style privilege escalations before production.

Verdict

Grab it for authorized pentests—solid docs and workflows shine despite 12 stars and 1.0% credibility score signaling early maturity. Test in a lab first; lacks broad validation but fills a sharp niche for kubelet api abuse. (198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.