Alevsk / dvkaLinks
Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.
â140Updated 2 months ago
Alternatives and similar repositories for dvka
Users that are interested in dvka are comparing it to the libraries listed below
Sorting:
- đ§° Multi Tool Kubernetes Pentest Imageâ233Updated last month
- â178Updated last month
- â72Updated 3 weeks ago
- A deliberately vulnerable Kubernetes clusterâ125Updated last year
- â46Updated 3 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.â98Updated 5 months ago
- â96Updated 4 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).â81Updated last year
- OWASP Kubernetes security and compliance tool [WIP]â106Updated 2 years ago
- Curating Falco rules with MITRE ATT&CK Matrixâ80Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsâ141Updated 5 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knâŚâ54Updated last year
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"â67Updated last year
- Tool for auditing RBACs in Kubernetesâ219Updated last year
- â248Updated 9 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testingâ461Updated 11 months ago
- Kubernetes Stranger Dangerâ62Updated last year
- A full insecure kubernetes application for testing security toolsâ87Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.â383Updated last year
- â21Updated 6 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.â47Updated last year
- An AWS IAM policy statement parser and query tool.â182Updated last year
- A tool for preventing the installation of malicious PyPI and npm packagesâ145Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.â55Updated 4 months ago
- truffleproc â hunt secrets in process memory (TruffleHog & gdb mashup)â118Updated last year
- â183Updated last month
- Response Engine for managing threats in your Kubernetesâ160Updated this week
- Offensive Kubernetes Threat Matrix -- kubenomicon.comâ39Updated 4 months ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.â161Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this âŚâ115Updated 3 weeks ago