Alevsk / dvkaLinks
Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.
β189Updated last month
Alternatives and similar repositories for dvka
Users that are interested in dvka are comparing it to the libraries listed below
Sorting:
- π§° Multi Tool Kubernetes Pentest Imageβ245Updated 2 months ago
- β182Updated 6 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β111Updated 10 months ago
- OWASP Kubernetes security and compliance tool [WIP]β107Updated 2 years ago
- Kubernetes Stranger Dangerβ66Updated last month
- β103Updated 8 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.β175Updated 9 months ago
- Curating Falco rules with MITRE ATT&CK Matrixβ84Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testingβ467Updated last year
- β84Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β59Updated 9 months ago
- A deliberately vulnerable Kubernetes clusterβ129Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSβ40Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β87Updated last year
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β481Updated 3 years ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this β¦β120Updated last month
- A collection of tools to improve your containerized apps security postureβ149Updated last year
- β47Updated 4 years ago
- A curated list of resources about detecting threats and defending Kubernetes systems.β397Updated 2 years ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.β366Updated 3 months ago
- A full insecure kubernetes application for testing security toolsβ89Updated last week
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knβ¦β56Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packagesβ171Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Updated 10 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β47Updated last year
- Validate the isolation posture of your container environment.β302Updated 2 months ago
- OWASP Foundation Web Respositoryβ595Updated 3 weeks ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"β67Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ351Updated 7 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.β289Updated last year