11/12 free views
Tool
CLI
Container Security

kube-hunter

by aquasecurity

4.9Kstars
597forks
97watchers
Updated 10 months ago
About

kube-hunter is a tool designed to discover and report security weaknesses in Kubernetes clusters from an attacker’s perspective.

Hunt for security weaknesses in Kubernetes clusters

Primary Use Case

kube-hunter is primarily used by security professionals and Kubernetes administrators to identify vulnerabilities and misconfigurations in their Kubernetes environments. It helps increase awareness and visibility of security issues by simulating attacker techniques, enabling proactive remediation before exploitation. It is suitable for scanning clusters you own or manage to improve their security posture.

Key Features
  • Performs active and remote scanning of Kubernetes clusters
  • Supports running as a container, on a local machine, or inside a Kubernetes pod
  • Maps discovered vulnerabilities to the Kubernetes ATT&CK Matrix
  • Provides a knowledge base with detailed vulnerability articles referenced by Vulnerability IDs (VIDs)
  • Offers multiple scanning modes including probing local network interfaces and remote IP/domain scanning
  • Includes integration with a web service for online result sharing via tokens
  • Supports custom hunting and Azure quick scanning options

Installation

  • Install Python and pip (prerequisite)
  • Install kube-hunter via pip: pip install kube-hunter
  • Alternatively, clone the repository and run from source
  • Run kube-hunter as a container using the image aquasec/kube-hunter
  • Deploy kube-hunter as a pod inside the Kubernetes cluster if needed

Usage

>_ kube-hunter --remote <IP or domain>

Run kube-hunter remotely against a Kubernetes cluster to simulate an external attacker’s perspective.

>_ kube-hunter --local

Run kube-hunter on a machine inside the cluster to scan local network interfaces.

>_ kube-hunter --pod

Run kube-hunter inside a Kubernetes pod to assess exposure from a compromised pod.

>_ docker run aquasec/kube-hunter --remote <IP or domain>

Run kube-hunter containerized for remote scanning.

Security Frameworks
Reconnaissance
Initial Access
Discovery
Lateral Movement
Collection
Usage Insights
  • Integrate kube-hunter scans into CI/CD pipelines for continuous Kubernetes security posture assessment.
  • Use kube-hunter findings to enrich purple team exercises by simulating attacker reconnaissance and exploitation paths.
  • Combine kube-hunter with automated remediation tools to accelerate fixing discovered misconfigurations.
  • Leverage kube-hunter’s Kubernetes ATT&CK matrix mapping to prioritize vulnerabilities based on attacker techniques.
  • Although no longer actively maintained, kube-hunter’s knowledge base is valuable for training Kubernetes administrators on common attack vectors.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about kube-hunter. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team80%
Blue Team40%
Purple Team60%
Details
LicenseApache License 2.0
LanguagePython
Open Issues217
Topics
vulnerabilities
kubernetes-clusters
hacktoberfest