Alevsk / dvkaLinks
Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.
β164Updated last week
Alternatives and similar repositories for dvka
Users that are interested in dvka are comparing it to the libraries listed below
Sorting:
- π§° Multi Tool Kubernetes Pentest Imageβ243Updated 3 months ago
- β179Updated 3 months ago
- Kubernetes Stranger Dangerβ64Updated 3 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β107Updated 7 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.β171Updated 6 months ago
- OWASP Kubernetes security and compliance tool [WIP]β106Updated 2 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSβ40Updated 11 months ago
- Curating Falco rules with MITRE ATT&CK Matrixβ82Updated last year
- β102Updated 6 months ago
- β81Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.β389Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testingβ462Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knβ¦β54Updated last year
- β46Updated 3 years ago
- A deliberately vulnerable Kubernetes clusterβ127Updated last year
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β47Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β55Updated 6 months ago
- A tool for preventing the installation of malicious npm and PyPI packagesβ153Updated last week
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β477Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β83Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ143Updated 7 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this β¦β116Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.β286Updated 11 months ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.β356Updated last week
- A collection of tools to improve your containerized apps security postureβ144Updated last year
- A full insecure kubernetes application for testing security toolsβ89Updated 3 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"β67Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ346Updated 4 months ago
- β255Updated 11 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β294Updated last week