DataDog / KubeHoundLinks
Tool for building Kubernetes attack paths
☆930Updated last month
Alternatives and similar repositories for KubeHound
Users that are interested in KubeHound are comparing it to the libraries listed below
Sorting:
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 9 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,402Updated 5 months ago
- A collection of manifests that will create pods with elevated privileges.☆660Updated last week
- 🧰 Multi Tool Kubernetes Pentest Image☆251Updated 4 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆474Updated 2 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,214Updated 11 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆401Updated 2 years ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆563Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆291Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆724Updated 3 months ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆769Updated last year
- OWASP Foundation Web Respository☆601Updated last month
- A client for kubelet☆859Updated 5 months ago
- Kubernetes Security Training Platform - focusing on security mitigation☆969Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆370Updated 5 months ago
- A tool to scan Kubernetes cluster for risky permissions☆1,410Updated 7 months ago
- ☆183Updated 8 months ago
- Kubernetes exploitation tool☆363Updated last year
- Falco rule repository☆150Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,218Updated last week
- Threat matrix for CI/CD Pipeline☆759Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆315Updated 2 months ago
- KBOM - Kubernetes Bill of Materials☆323Updated 5 months ago
- ☆420Updated 2 years ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆194Updated 3 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- Connect Falco to your ecosystem☆640Updated last month
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆469Updated this week
- A curated list of awesome Kubernetes security resources☆949Updated 2 years ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆231Updated 2 months ago