Alevsk / dvkaLinks
Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.
β189Updated this week
Alternatives and similar repositories for dvka
Users that are interested in dvka are comparing it to the libraries listed below
Sorting:
- π§° Multi Tool Kubernetes Pentest Imageβ246Updated 2 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β109Updated 8 months ago
- β180Updated 4 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.β172Updated 7 months ago
- OWASP Kubernetes security and compliance tool [WIP]β106Updated 2 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testingβ465Updated last year
- Kubernetes Stranger Dangerβ65Updated last week
- β102Updated 7 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knβ¦β56Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSβ40Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β84Updated last year
- β83Updated 2 months ago
- Curating Falco rules with MITRE ATT&CK Matrixβ84Updated last year
- A collection of tools to improve your containerized apps security postureβ148Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.β392Updated 2 years ago
- β47Updated 4 years ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β47Updated last year
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β479Updated 3 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ350Updated 6 months ago
- A full insecure kubernetes application for testing security toolsβ89Updated 5 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ143Updated 8 months ago
- A deliberately vulnerable Kubernetes clusterβ128Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β56Updated 7 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"β67Updated last year
- Response Engine for managing threats in your Kubernetesβ170Updated last week
- Validate the isolation posture of your container environment.β298Updated last month
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.β288Updated last year
- A tool for preventing the installation of malicious npm and PyPI packagesβ160Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β299Updated last month
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this β¦β118Updated 4 months ago