ANSSI-FR / OSAKALinks
Outil de sécurité des architectures kubernetes avancées
☆56Updated 4 months ago
Alternatives and similar repositories for OSAKA
Users that are interested in OSAKA are comparing it to the libraries listed below
Sorting:
- ☆84Updated 3 months ago
- This repository contains the container image scanning tool ORCA☆41Updated last month
- 🧰 Multi Tool Kubernetes Pentest Image☆245Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Updated 6 months ago
- ☆16Updated last year
- ☆182Updated 5 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆310Updated last week
- Pentester-focused Docker registry tool to enumerate and pull images☆33Updated 2 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆58Updated 8 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆120Updated 2 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆112Updated last week
- Validate the isolation posture of your container environment.☆300Updated 2 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- boostsecurityio/lotp☆136Updated this week
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 7 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 9 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 9 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆189Updated last month
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆73Updated 6 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆121Updated 3 weeks ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆42Updated 2 months ago
- ☆35Updated 6 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆37Updated 2 months ago
- ☆41Updated last year