BishopFox / badPods
A collection of manifests that will create pods with elevated privileges.
☆610Updated 2 years ago
Alternatives and similar repositories for badPods:
Users that are interested in badPods are comparing it to the libraries listed below
- A client for kubelet☆763Updated last month
- Kubernetes focused container assessment and context discovery tool for penetration testing☆448Updated 8 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆343Updated last year
- Peirates - Kubernetes Penetration Testing tool☆1,280Updated last month
- A tool to scan Kubernetes cluster for risky permissions☆1,353Updated 2 months ago
- Kubernetes Security Training Platform - focusing on security mitigation☆941Updated 5 months ago
- Tool for building Kubernetes attack paths☆818Updated last week
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,150Updated 2 weeks ago
- Tool for auditing RBACs in Kubernetes☆215Updated last year
- ☆237Updated 5 months ago
- A curated list of awesome Kubernetes security resources☆909Updated last year
- Security risk analysis for Kubernetes resources☆1,281Updated this week
- 🧰 Multi Tool Kubernetes Pentest Image☆222Updated 5 months ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆184Updated 2 weeks ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆474Updated 3 years ago
- OWASP Foundation Web Respository☆575Updated last year
- Kubernetes RBAC static analysis & visualisation tool☆697Updated this week
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆162Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆994Updated 10 months ago
- Rapid7 | insightCloudSec | Kubernetes RBAC Power Toys - Visualize, Analyze, Generate & Query☆993Updated last week
- A container analysis and exploitation tool for pentesters and engineers.☆660Updated last year
- The Kubernetes Security Profiles Operator☆743Updated this week
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆267Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆373Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆334Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆118Updated this week
- Review Access - kubectl plugin to show an access matrix for k8s server resources☆1,328Updated last year
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 3 weeks ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆206Updated 3 years ago
- Kubernetes exploitation tool☆361Updated 6 months ago