https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-1
https://github.com/aquasecurity/kube-hunter
https://github.com/inguardians/peirates