Take it like a gift
Kubestroyer
Exploit Kubernetes clusters misconfigurations and be the swiss army knife of your pentests.
GTFOBins
Unix binaries that can be used to bypass local security restrictions in misconfigured systems.