ANSSI-FR / OSAKALinks
Outil de sécurité des architectures kubernetes avancées
☆54Updated last month
Alternatives and similar repositories for OSAKA
Users that are interested in OSAKA are comparing it to the libraries listed below
Sorting:
- ☆81Updated last month
- This repository contains the container image scanning tool ORCA☆40Updated 2 months ago
- ☆179Updated 3 months ago
- ☆16Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆243Updated 3 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆48Updated 5 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆164Updated last week
- Validate the isolation posture of your container environment.☆296Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆107Updated 7 months ago
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆26Updated 9 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆22Updated 11 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆294Updated last week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 6 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 10 months ago
- ☆41Updated 11 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated 4 months ago
- ☆50Updated last year
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆71Updated 3 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated last year
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆40Updated 6 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- Scan your account for the use of untrusted AMIs☆26Updated 3 months ago
- DEbian Cve REproducer Tool☆25Updated 2 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 4 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 9 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 2 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 9 months ago