Alevsk / dvkaLinks
Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.
β190Updated 2 months ago
Alternatives and similar repositories for dvka
Users that are interested in dvka are comparing it to the libraries listed below
Sorting:
- π§° Multi Tool Kubernetes Pentest Imageβ246Updated 2 months ago
- OWASP Kubernetes security and compliance tool [WIP]β107Updated 2 years ago
- β103Updated last week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β111Updated 10 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.β175Updated 10 months ago
- β182Updated 6 months ago
- Kubernetes Stranger Dangerβ66Updated 2 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testingβ469Updated 2 weeks ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β47Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this β¦β122Updated 2 months ago
- β85Updated 3 weeks ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knβ¦β56Updated last year
- A deliberately vulnerable Kubernetes clusterβ130Updated last year
- β47Updated 4 years ago
- Curating Falco rules with MITRE ATT&CK Matrixβ84Updated last year
- A collection of tools to improve your containerized apps security postureβ149Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSβ40Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β87Updated last year
- Response Engine for managing threats in your Kubernetesβ181Updated 2 weeks ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β482Updated 3 years ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"β67Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Updated 10 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β59Updated 9 months ago
- Validate the isolation posture of your container environment.β303Updated 3 months ago
- OWASP Foundation Web Respositoryβ100Updated 2 weeks ago
- This repository contains the container image scanning tool ORCAβ42Updated 2 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ351Updated 8 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.β397Updated 2 years ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Securityβ227Updated last month
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packagesβ174Updated last week