Skip to content

Releases: madhuakula/kubernetes-goat

v2.3.0

03 Sep 22:12
aa72b61
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v2.2.0...v2.3.0

v2.2.0

08 Apr 22:31
76d1353
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v2.1.2...v2.2.0

v2.1.2

06 Aug 16:07
f6c07e7
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v2.1.1...v2.1.2

v2.1.1

18 May 18:35
4f7e6a2
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v2.1.0...v2.1.1

v2.1.0

16 May 21:34
c9a6f17
Compare
Choose a tag to compare

What's Changed

  • Added support for linux/amd64, linux/arm64, linux/arm/v8 using docker buildx platform commands #45
  • Removing the superadmin cluster role/binding by @adamhurm in #44
  • Minor updates in documentation and commands

New Contributors

Full Changelog: v2.0.0...v2.1.0

v2.0.0

28 Apr 18:41
43d49b3
Compare
Choose a tag to compare

What's Changed

  • New Kubernetes Goat logo
  • Complete documentation and guide update re-vamp to Docusaurus
  • Updated the 20 scenarios with a new structure, diagrams, and details
  • Updated the entire Kubernetes Goat structure for usage

New Contributors

  • @apvarun added multiple contributions to documentation and fixes
  • @ant4g0nist made the new logo for Kubernetes Goat

Full Changelog: v1.1.0...v2.0.0

Multiple new scenarios and major updates

04 Jun 00:36
3cc4fe4
Compare
Choose a tag to compare
  • Multiple scenarios including defense scenarios
  • KIND Setup support
  • Added KICS tool report
  • Many others

Welcome Kubernetes-Goat

15 Jun 15:46
0734fbf
Compare
Choose a tag to compare

Scenarios

  1. Sensitive keys in code bases
  2. DIND(docker-in-docker) exploitation
  3. SSRF in K8S world
  4. Container escape to access host system
  5. Docker CIS Benchmarks analysis
  6. Kubernetes CIS Benchmarks analysis
  7. Attacking private registry
  8. NodePort exposed services
  9. Helm v2 tiller to PwN the cluster
  10. Analysing crypto miner container
  11. Kubernetes Namespaces bypass
  12. Gaining environment information
  13. DoS the memory/cpu resources
  14. Hacker Container preview