HackTricks

Hacktricks ๋กœ๊ณ  ๋ฐ ๋ชจ์…˜ ๋””์ž์ธ: @ppieranacho.

HackTricks๋ฅผ ๋กœ์ปฌ์—์„œ ์‹คํ–‰ํ•˜๊ธฐ

# Download latest version of hacktricks
git clone https://github.com/HackTricks-wiki/hacktricks

# Select the language you want to use
export LANG="master" # Leave master for english
# "af" for Afrikaans
# "de" for German
# "el" for Greek
# "es" for Spanish
# "fr" for French
# "hi" for HindiP
# "it" for Italian
# "ja" for Japanese
# "ko" for Korean
# "pl" for Polish
# "pt" for Portuguese
# "sr" for Serbian
# "sw" for Swahili
# "tr" for Turkish
# "uk" for Ukrainian
# "zh" for Chinese

# Run the docker container indicating the path to the hacktricks folder
docker run -d --rm --platform linux/amd64 -p 3337:3000 --name hacktricks -v $(pwd)/hacktricks:/app ghcr.io/hacktricks-wiki/hacktricks-cloud/translator-image bash -c "mkdir -p ~/.ssh && ssh-keyscan -H github.com >> ~/.ssh/known_hosts && cd /app && git config --global --add safe.directory /app && git checkout $LANG && git pull && MDBOOK_PREPROCESSOR__HACKTRICKS__ENV=dev mdbook serve --hostname 0.0.0.0"

Your local copy of HackTricks will be available at http://localhost:3337 after <5 minutes (it needs to build the book, be patient).

๊ธฐ์—… ํ›„์›์‚ฌ

STM Cyber

STM Cyber์€ ์Šฌ๋กœ๊ฑด์ด HACK THE UNHACKABLE์ธ ํ›Œ๋ฅญํ•œ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ํšŒ์‚ฌ์ž…๋‹ˆ๋‹ค. ์ž์ฒด ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•˜๊ณ  ์ž์ฒด ํ•ดํ‚น ๋„๊ตฌ๋ฅผ ๊ฐœ๋ฐœํ•˜์—ฌ pentesting, Red teams ๋ฐ ๊ต์œก ๊ฐ™์€ ์—ฌ๋Ÿฌ ๊ฐ€์น˜ ์žˆ๋Š” ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

๊ทธ๋“ค์˜ ๋ธ”๋กœ๊ทธ๋Š” https://blog.stmcyber.com์—์„œ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

STM Cyber๋Š” ๋˜ํ•œ HackTricks์™€ ๊ฐ™์€ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์˜คํ”ˆ ์†Œ์Šค ํ”„๋กœ์ ํŠธ๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค :)


RootedCON

RootedCON๋Š” ์ŠคํŽ˜์ธ์—์„œ ๊ฐ€์žฅ ์ค‘์š”ํ•œ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ํ–‰์‚ฌ์ด๋ฉฐ ์œ ๋Ÿฝ์—์„œ๋„ ์†๊ผฝํžˆ๋Š” ํ–‰์‚ฌ ์ค‘ ํ•˜๋‚˜์ž…๋‹ˆ๋‹ค. ๊ธฐ์ˆ  ์ง€์‹ ์ „ํŒŒ๋ฅผ ์‚ฌ๋ช…์œผ๋กœ ํ•˜๋Š” ์ด ์ปจํผ๋Ÿฐ์Šค๋Š” ๋ชจ๋“  ๋ถ„์•ผ์˜ ๊ธฐ์ˆ  ๋ฐ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์ „๋ฌธ๊ฐ€๋“ค์ด ๋ชจ์ด๋Š” ์ค‘์š”ํ•œ ๋งŒ๋‚จ์˜ ์žฅ์ž…๋‹ˆ๋‹ค.

RootedCON - RootedCON


Intigriti

Intigriti๋Š” ์œ ๋Ÿฝ ์ตœ๊ณ ์˜(#1) ์œค๋ฆฌ์  ํ•ดํ‚น ๋ฐ bug bounty ํ”Œ๋žซํผ์ž…๋‹ˆ๋‹ค.

๋ฒ„๊ทธ ๋ฐ”์šดํ‹ฐ ํŒ: ํ•ด์ปค๊ฐ€ ๋งŒ๋“  ํ”„๋ฆฌ๋ฏธ์—„ ๋ฒ„๊ทธ ๋ฐ”์šดํ‹ฐ ํ”Œ๋žซํผ์ธ Intigriti์— ๊ฐ€์ž…ํ•˜์„ธ์š”! ์ง€๊ธˆ https://go.intigriti.com/hacktricks์—์„œ ์ฐธ์—ฌํ•˜์—ฌ ์ตœ๋Œ€ $100,000์˜ ๋ณด์ƒ์„ ๋ฐ›์œผ์„ธ์š”!

Register - Intigriti


Trickest


์„ธ๊ณ„์—์„œ ๊ฐ€์žฅ ์ง„๋ณด๋œ ์ปค๋ฎค๋‹ˆํ‹ฐ ๋„๊ตฌ๋“ค๋กœ ๊ตฌ๋™๋˜๋Š” ์›Œํฌํ”Œ๋กœ๋ฅผ ์‰ฝ๊ฒŒ ๊ตฌ์ถ•ํ•˜๊ณ  ์ž๋™ํ™”ํ•˜๋ ค๋ฉด Trickest๋ฅผ ์‚ฌ์šฉํ•˜์„ธ์š”.

์ง€๊ธˆ ์•ก์„ธ์Šคํ•˜๊ธฐ:

https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks


HACKENPROOF

HackenProof Discord ์„œ๋ฒ„์— ๊ฐ€์ž…ํ•˜์—ฌ ๊ฒฝํ—˜ ๋งŽ์€ ํ•ด์ปค ๋ฐ ๋ฒ„๊ทธ ๋ฐ”์šดํ‹ฐ ํ—Œํ„ฐ๋“ค๊ณผ ์†Œํ†ตํ•˜์„ธ์š”!

  • ํ•ดํ‚น ์ธ์‚ฌ์ดํŠธ: ํ•ดํ‚น์˜ ์Šค๋ฆด๊ณผ ๋„์ „์„ ๋‹ค๋ฃจ๋Š” ์ฝ˜ํ…์ธ ์— ์ฐธ์—ฌํ•˜์„ธ์š”
  • ์‹ค์‹œ๊ฐ„ ํ•ดํ‚น ๋‰ด์Šค: ๋น ๋ฅด๊ฒŒ ๋ณ€ํ•˜๋Š” ํ•ดํ‚น ์„ธ๊ณ„์˜ ์ตœ์‹  ๋‰ด์Šค์™€ ์ธ์‚ฌ์ดํŠธ๋ฅผ ์‹ค์‹œ๊ฐ„์œผ๋กœ ๋ฐ›์•„๋ณด์„ธ์š”
  • ์ตœ์‹  ๊ณต์ง€: ์ƒˆ๋กœ ์‹œ์ž‘๋˜๋Š” ๋ฒ„๊ทธ ๋ฐ”์šดํ‹ฐ์™€ ์ค‘์š”ํ•œ ํ”Œ๋žซํผ ์—…๋ฐ์ดํŠธ๋ฅผ ํ™•์ธํ•˜์„ธ์š”

์ง€๊ธˆ Discord์— ๊ฐ€์ž…ํ•˜์—ฌ ์ตœ๊ณ ์˜ ํ•ด์ปค๋“ค๊ณผ ํ˜‘์—…์„ ์‹œ์ž‘ํ•˜์„ธ์š”!


Modern Security โ€“ AI & Application Security Training Platform

Modern Security

Modern Security๋Š” ์‹ค๋ฌด ์ค‘์‹ฌ์˜ AI ๋ณด์•ˆ ๊ต์œก์„ ์—”์ง€๋‹ˆ์–ด๋ง ์šฐ์„ ์˜ ํ•ธ์ฆˆ์˜จ ๋žฉ ๋ฐฉ์‹์œผ๋กœ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์šฐ๋ฆฌ์˜ ๊ณผ์ •์€ ๋ณด์•ˆ ์—”์ง€๋‹ˆ์–ด, AppSec ์ „๋ฌธ๊ฐ€, ๊ทธ๋ฆฌ๊ณ  ์‹ค์ œ AI/LLM ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๊ตฌ์ถ•, ๊ณต๊ฒฉ, ๋ณดํ˜ธํ•˜๋ ค๋Š” ๊ฐœ๋ฐœ์ž๋ฅผ ์œ„ํ•ด ์„ค๊ณ„๋˜์—ˆ์Šต๋‹ˆ๋‹ค.

AI Security Certification์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์‹ค๋ฌด ๊ธฐ์ˆ ์— ์ค‘์ ์„ ๋‘ก๋‹ˆ๋‹ค:

  • LLM ๋ฐ AI ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ณด์•ˆ
  • AI ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ์œ„ํ˜‘ ๋ชจ๋ธ๋ง
  • Embeddings, vector databases, ๋ฐ RAG ๋ณด์•ˆ
  • LLM ๊ณต๊ฒฉ, ๋‚จ์šฉ ์‹œ๋‚˜๋ฆฌ์˜ค ๋ฐ ์‹ค์งˆ์ ์ธ ๋ฐฉ์–ด์ฑ…
  • ์•ˆ์ „ํ•œ ์„ค๊ณ„ ํŒจํ„ด ๋ฐ ๋ฐฐํฌ ๊ณ ๋ ค์‚ฌํ•ญ

๋ชจ๋“  ๊ณผ์ •์€ ์˜จ๋””๋งจ๋“œ, ๋žฉ ์ค‘์‹ฌ์ด๋ฉฐ ๋‹จ์ง€ ์ด๋ก ์ด ์•„๋‹Œ ํ˜„์‹ค ์„ธ๊ณ„์˜ ๋ณด์•ˆ ํŠธ๋ ˆ์ด๋“œ์˜คํ”„์— ๋งž์ถฐ ์„ค๊ณ„๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.

๐Ÿ‘‰ AI Security ๊ณผ์ •์— ๋Œ€ํ•œ ์ž์„ธํ•œ ๋‚ด์šฉ: https://www.modernsecurity.io/courses/ai-security-certification

https://modernsecurity.io/


SerpApi

SerpApi๋Š” ๊ฒ€์ƒ‰ ์—”์ง„ ๊ฒฐ๊ณผ์— ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š” ๋น ๋ฅด๊ณ  ์‰ฌ์šด API๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋“ค์€ ๊ฒ€์ƒ‰ ์—”์ง„์„ ์Šคํฌ๋ž˜ํ•‘ํ•˜๊ณ , ํ”„๋ก์‹œ๋ฅผ ๊ด€๋ฆฌํ•˜๋ฉฐ, captchas๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ , ๋ชจ๋“  ํ’๋ถ€ํ•œ ๊ตฌ์กฐํ™”๋œ ๋ฐ์ดํ„ฐ๋ฅผ ํŒŒ์‹ฑํ•ด์ค๋‹ˆ๋‹ค.

SerpApi์˜ ๊ตฌ๋… ํ”Œ๋žœ์—๋Š” Google, Bing, Baidu, Yahoo, Yandex ๋“ฑ ๋‹ค์–‘ํ•œ ๊ฒ€์ƒ‰ ์—”์ง„์„ ์Šคํฌ๋ž˜ํ•‘ํ•˜๊ธฐ ์œ„ํ•œ 50๊ฐœ ์ด์ƒ์˜ API ์ ‘๊ทผ์ด ํฌํ•จ๋ฉ๋‹ˆ๋‹ค.
๋‹ค๋ฅธ ์ œ๊ณต์—…์ฒด์™€ ๋‹ฌ๋ฆฌ, SerpApi๋Š” ๋‹จ์ˆœํžˆ ์œ ๊ธฐ์  ๊ฒฐ๊ณผ๋งŒ ์Šคํฌ๋ž˜ํ•‘ํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. SerpApi ์‘๋‹ต์—๋Š” ์ผ๊ด€๋˜๊ฒŒ ๊ด‘๊ณ , ์ธ๋ผ์ธ ์ด๋ฏธ์ง€ ๋ฐ ๋น„๋””์˜ค, ์ง€์‹ ๊ทธ๋ž˜ํ”„ ๋ฐ ๊ฒ€์ƒ‰ ๊ฒฐ๊ณผ์— ํ‘œ์‹œ๋˜๋Š” ๊ธฐํƒ€ ์š”์†Œ๋“ค์ด ํฌํ•จ๋ฉ๋‹ˆ๋‹ค.

ํ˜„์žฌ SerpApi ๊ณ ๊ฐ์œผ๋กœ๋Š” Apple, Shopify, GrubHub ๋“ฑ์ด ์žˆ์Šต๋‹ˆ๋‹ค.
์ž์„ธํ•œ ๋‚ด์šฉ์€ ๊ทธ๋“ค์˜ ๋ธ”๋กœ๊ทธ๋ฅผ ํ™•์ธํ•˜๊ฑฐ๋‚˜ playground์—์„œ ์˜ˆ์ œ๋ฅผ ์‹œ๋„ํ•ด๋ณด์„ธ์š”.
์—ฌ๊ธฐ์—์„œ ๋ฌด๋ฃŒ ๊ณ„์ • ์ƒ์„ฑ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.


8kSec Academy โ€“ In-Depth Mobile Security Courses

๋ชจ๋ฐ”์ผ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐ ์žฅ์น˜๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด ์ทจ์•ฝ์  ์—ฐ๊ตฌ, ์นจํˆฌ ํ…Œ์ŠคํŠธ, ๋ฆฌ๋ฒ„์Šค ์—”์ง€๋‹ˆ์–ด๋ง์— ํ•„์š”ํ•œ ๊ธฐ์ˆ ๊ณผ ์ง€์‹์„ ๋ฐฐ์šฐ์„ธ์š”. iOS ๋ฐ Android ๋ณด์•ˆ์„ ์˜จ๋””๋งจ๋“œ ๊ณผ์ •์œผ๋กœ ๋งˆ์Šคํ„ฐํ•˜๊ณ  ์ธ์ฆ์„ ๋ฐ›์œผ์„ธ์š”:

On-demand Mobile & AI Security Trainings | 8kSec Academy


WebSec

WebSec๋Š” ์•”์Šคํ…Œ๋ฅด๋‹ด์— ๊ธฐ๋ฐ˜์„ ๋‘” ์ „๋ฌธ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ํšŒ์‚ฌ๋กœ, ์ตœ์‹  ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์œ„ํ˜‘์œผ๋กœ๋ถ€ํ„ฐ ์ „ ์„ธ๊ณ„ ๊ธฐ์—…๋“ค์„ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด **๊ณต๊ฒฉ์  ๋ณด์•ˆ ์„œ๋น„์Šค(offensive-security services)**๋ฅผ ํ˜„๋Œ€์ ์ธ ์ ‘๊ทผ ๋ฐฉ์‹์œผ๋กœ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

WebSec๋Š” ์•”์Šคํ…Œ๋ฅด๋‹ด๊ณผ Wyoming์— ์‚ฌ๋ฌด์†Œ๋ฅผ ๋‘” ๊ตญ์ œ ๋ณด์•ˆ ํšŒ์‚ฌ์ž…๋‹ˆ๋‹ค. ๊ทธ๋“ค์€ Pentesting, Security ๊ฐ์‚ฌ, ์ธ์‹ ๊ต์œก, ํ”ผ์‹ฑ ์บ ํŽ˜์ธ, ์ฝ”๋“œ ๋ฆฌ๋ทฐ, ์ต์Šคํ”Œ๋กœ์ž‡ ๊ฐœ๋ฐœ, ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€ ์•„์›ƒ์†Œ์‹ฑ ๋“ฑ ์˜ฌ์ธ์› ๋ณด์•ˆ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์—…๊ณ„ ํ‰๊ท ๊ณผ ๋‹ฌ๋ฆฌ WebSec์˜ ๋˜ ๋‹ค๋ฅธ ์žฅ์ ์€ ์ž์‹ ๋“ค์˜ ์—ญ๋Ÿ‰์— ๋งค์šฐ ์ž์‹ ๊ฐ์ด ์žˆ๋‹ค๋Š” ์ ์ด๋ฉฐ, ๊ทธ๋“ค์€ ์ตœ๊ณ  ํ’ˆ์งˆ์˜ ๊ฒฐ๊ณผ๋ฅผ ๋ณด์žฅํ•ฉ๋‹ˆ๋‹ค. ์›น์‚ฌ์ดํŠธ์—๋Š” โ€œIf we canโ€™t hack it, You donโ€™t pay it!โ€œ๋ผ๊ณ  ๋ช…์‹œ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ์ž์„ธํ•œ ์ •๋ณด๋Š” ๊ทธ๋“ค์˜ ์›น์‚ฌ์ดํŠธ ๋ฐ ๋ธ”๋กœ๊ทธ๋ฅผ ํ™•์ธํ•˜์„ธ์š”!

๋˜ํ•œ WebSec๋Š” HackTricks์˜ ํ—Œ์‹ ์ ์ธ ํ›„์›์ž์ด๊ธฐ๋„ ํ•ฉ๋‹ˆ๋‹ค.

- YouTube


CyberHelmets

cyberhelmets logo

ํ˜„์žฅ ์ค‘์‹ฌ์œผ๋กœ ์„ค๊ณ„, ๋‹น์‹  ์ค‘์‹ฌ์œผ๋กœ ๊ตฌ์„ฑ.
Cyber Helmets๋Š” ์—…๊ณ„ ์ „๋ฌธ๊ฐ€๋“ค์ด ์ง์ ‘ ๊ตฌ์„ฑํ•˜๊ณ  ์ด๋„๋Š” ์‹ค์šฉ์ ์ธ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ๊ต์œก์„ ๊ฐœ๋ฐœํ•˜๊ณ  ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋“ค์˜ ํ”„๋กœ๊ทธ๋žจ์€ ์ด๋ก ์„ ๋„˜์–ด ์‹ค์ œ ์œ„ํ˜‘์„ ๋ฐ˜์˜ํ•œ ๋งž์ถคํ˜• ํ™˜๊ฒฝ์„ ์‚ฌ์šฉํ•˜์—ฌ ํŒ€์—๊ฒŒ ๊นŠ์€ ์ดํ•ด์™€ ์‹ค๋ฌด ๊ฐ€๋Šฅํ•œ ๊ธฐ์ˆ ์„ ์ œ๊ณตํ•˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๋งž์ถคํ˜• ๊ต์œก ๋ฌธ์˜๋Š” ์—ฌ๊ธฐ์—์„œ ์—ฐ๋ฝํ•˜์„ธ์š”.

๊ทธ๋“ค์˜ ๊ต์œก์ด ํŠน๋ณ„ํ•œ ์ด์œ :

  • ๋งž์ถคํ˜• ์ฝ˜ํ…์ธ  ๋ฐ ๋žฉ
  • ์ตœ์ƒ๊ธ‰ ๋„๊ตฌ์™€ ํ”Œ๋žซํผ ์ง€์›
  • ์‹ค๋ฌด์ž๊ฐ€ ์„ค๊ณ„ํ•˜๊ณ  ๊ฐ•์˜

Cybersecurity Courses & Certifications | Cyber Helmets


Last Tower Solutions

lasttower logo

Last Tower Solutions๋Š” ๊ต์œก ๊ธฐ๊ด€ ๋ฐ FinTech ๊ธฐ๊ด€์„ ์œ„ํ•œ ์ „๋ฌธํ™”๋œ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ, ํŠนํžˆ penetration testing, cloud security assessments, ๋ฐ compliance readiness (SOC 2, PCI-DSS, NIST)์— ์ค‘์ ์„ ๋‘ก๋‹ˆ๋‹ค. ์ €ํฌ ํŒ€์—๋Š” OSCP ๋ฐ CISSP ์ธ์ฆ ์ „๋ฌธ๊ฐ€๋“ค์ด ํฌํ•จ๋˜์–ด ์žˆ์–ด ๋ชจ๋“  ์ฐธ์—ฌ์— ๊นŠ์€ ๊ธฐ์ˆ ์  ์ „๋ฌธ์„ฑ๊ณผ ์—…๊ณ„ ํ‘œ์ค€ ์ธ์‚ฌ์ดํŠธ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์šฐ๋ฆฌ๋Š” ์ž๋™ํ™”๋œ ์Šค์บ”์„ ๋„˜์–ด ์ˆ˜์ž‘์—…, ์ธํ…”๋ฆฌ์ „์Šค ๊ธฐ๋ฐ˜์˜ ํ…Œ์ŠคํŠธ๋ฅผ ํ†ตํ•ด ๊ณ ์œ„ํ—˜ ํ™˜๊ฒฝ์— ๋งž์ถ˜ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ํ•™์ƒ ๊ธฐ๋ก ๋ณดํ˜ธ์—์„œ ๊ธˆ์œต ๊ฑฐ๋ž˜ ๋ณดํ˜ธ์— ์ด๋ฅด๊ธฐ๊นŒ์ง€, ์กฐ์ง์ด ๊ฐ€์žฅ ์ค‘์š”ํ•œ ๊ฒƒ์„ ๋ฐฉ์–ดํ•˜๋„๋ก ๋•์Šต๋‹ˆ๋‹ค.

โ€œA quality defense requires knowing the offense, we provide security through understanding.โ€

์ตœ์‹  ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์†Œ์‹์„ ํ™•์ธํ•˜๋ ค๋ฉด ๊ทธ๋“ค์˜ ๋ธ”๋กœ๊ทธ๋ฅผ ๋ฐฉ๋ฌธํ•˜์„ธ์š”.

Last Tower Solutions | Cybersecurity Consulting for Educational Institutions


K8Studio - The Smarter GUI to Manage Kubernetes.

k8studio logo

K8Studio IDE๋Š” DevOps, DevSecOps ๋ฐ ๊ฐœ๋ฐœ์ž๋“ค์ด Kubernetes ํด๋Ÿฌ์Šคํ„ฐ๋ฅผ ํšจ์œจ์ ์œผ๋กœ ๊ด€๋ฆฌ, ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. AI ๊ธฐ๋ฐ˜ ์ธ์‚ฌ์ดํŠธ, ๊ณ ๊ธ‰ ๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ ๋ฐ ์ง๊ด€์ ์ธ CloudMaps GUI๋ฅผ ํ™œ์šฉํ•˜์—ฌ ํด๋Ÿฌ์Šคํ„ฐ๋ฅผ ์‹œ๊ฐํ™”ํ•˜๊ณ  ์ƒํƒœ๋ฅผ ํŒŒ์•…ํ•˜๋ฉฐ ์ž์‹  ์žˆ๊ฒŒ ์กฐ์น˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋˜ํ•œ K8Studio๋Š” ๋ชจ๋“  ์ฃผ์š” Kubernetes ๋ฐฐํฌํŒ(AWS, GCP, Azure, DO, Rancher, K3s, Openshift ๋“ฑ)๊ณผ ํ˜ธํ™˜๋ฉ๋‹ˆ๋‹ค.

K8Studio: Kubernetes UI for DevOps & DevSecOps Teams


๋ผ์ด์„ ์Šค ๋ฐ ๋ฉด์ฑ… ์กฐํ•ญ

๋‹ค์Œ์—์„œ ํ™•์ธํ•˜์„ธ์š”:

HackTricks Values & FAQ

Github ํ†ต๊ณ„

HackTricks Github Stats

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ