{
	"id": "23f5d27a-c6b4-439d-8003-42017b2f6e35",
	"created_at": "2026-04-06T00:21:25.052698Z",
	"updated_at": "2026-04-10T03:21:05.991054Z",
	"deleted_at": null,
	"sha1_hash": "73d4dbd7a8d2bd04a43656d0dbb8a6f0fb32d94b",
	"title": "GitHub - inguardians/peirates: Peirates - Kubernetes Penetration Testing tool",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 208065,
	"plain_text": "GitHub - inguardians/peirates: Peirates - Kubernetes Penetration\r\nTesting tool\r\nBy JayBeale\r\nArchived: 2026-04-05 15:29:45 UTC\r\nRelease gosec\r\nWhat is Peirates?\r\nPeirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes\r\ncluster. It automates known techniques to steal and collect service account tokens, secrets, obtain further code\r\nexecution, and gain control of the cluster.\r\nhttps://github.com/inguardians/peirates\r\nPage 1 of 3\n\nWhere do I run Peirates?\r\nYou run Peirates from a container running on Kubernetes or from a Kubernetes node, outside the container.\r\nDoes Peirates attack a Kubernetes cluster?\r\nYes, it absolutely does. Talk to your lawyer and the cluster owners before using this tool in a Kubernetes cluster.\r\nWho creates Peirates?\r\nInGuardians' CTO Jay Beale first conceived of Peirates and put together a group of InGuardians developers to\r\ncreate it with him, including Faith Alderson, Adam Crompton and Dave Mayer. Faith convinced us to all learn\r\nGolang, so she could implement the tool's use of the kubectl library from the Kubernetes project. Adam persuaded\r\nthe group to use a highly-interactive user interface. Dave brought contagious enthusiasm. Together, these four\r\ndevelopers implemented attacks and began releasing this tool that we use on our penetration tests.\r\nOther contributors have helped as well - see GitHub to see more, but please also review credits.md.\r\nDo you welcome contributions?\r\nYes, we absolutely do. Submit a pull request and/or reach out to peirates-dev@inguardians.com.\r\nWhat license is this released under?\r\nPeirates is released under the GPLv2 license.\r\nRunning Peirates\r\nIf you just want the peirates binary to start attacking things, grab the latest release from the releases page.\r\nPeirates as a Container Image\r\nYou can find a useful alpine-peirates container image on Docker Hub, with a version number tag that tracks the\r\nPeirates version.\r\nFor example, for alpine-peirates:1.1.16 , which contains peirates version 1.1.16 , run:\r\ndocker pull bustakube/alpine-peirates:1.1.16\r\nBuilding Peirates\r\nHowever, if you want to build from source, read on!\r\nGet peirates\r\nhttps://github.com/inguardians/peirates\r\nPage 2 of 3\n\ngo get -v \"github.com/inguardians/peirates\"\r\nGet libary sources if you haven't already (Warning: this will take almost a gig of space because it needs the whole\r\nkubernetes repository)\r\ngo get -v \"k8s.io/kubectl/pkg/cmd\" \"github.com/aws/aws-sdk-go\"\r\nBuild the executable\r\ncd $GOPATH/github.com/inguardians/peirates/scripts\r\n./build.sh\r\nThis will generate an executable file named peirates in the same directory.\r\nSource: https://github.com/inguardians/peirates\r\nhttps://github.com/inguardians/peirates\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://github.com/inguardians/peirates"
	],
	"report_names": [
		"peirates"
	],
	"threat_actors": [],
	"ts_created_at": 1775434885,
	"ts_updated_at": 1775791265,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/73d4dbd7a8d2bd04a43656d0dbb8a6f0fb32d94b.pdf",
		"text": "https://archive.orkl.eu/73d4dbd7a8d2bd04a43656d0dbb8a6f0fb32d94b.txt",
		"img": "https://archive.orkl.eu/73d4dbd7a8d2bd04a43656d0dbb8a6f0fb32d94b.jpg"
	}
}