DataDog / KubeHoundLinks
Tool for building Kubernetes attack paths
☆940Updated 3 weeks ago
Alternatives and similar repositories for KubeHound
Users that are interested in KubeHound are comparing it to the libraries listed below
Sorting:
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 10 months ago
- A collection of manifests that will create pods with elevated privileges.☆672Updated last month
- Peirates - Kubernetes Penetration Testing tool☆1,419Updated 3 weeks ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆475Updated 3 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆252Updated 5 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,215Updated last year
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆570Updated 2 weeks ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆726Updated 4 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆293Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆404Updated 2 years ago
- OWASP Foundation Web Respository☆601Updated 2 months ago
- Kubernetes Security Training Platform - focusing on security mitigation☆977Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆314Updated 2 weeks ago
- A client for kubelet☆871Updated 6 months ago
- Falco rule repository☆153Updated this week
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆369Updated 6 months ago
- A tool to scan Kubernetes cluster for risky permissions☆1,413Updated 8 months ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆767Updated last year
- Kubernetes exploitation tool☆364Updated last year
- ☆185Updated last week
- ☆422Updated 3 years ago
- KBOM - Kubernetes Bill of Materials☆323Updated 6 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆196Updated 4 months ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,006Updated last year
- Threat matrix for CI/CD Pipeline☆760Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Updated this week
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆479Updated last month
- Response Engine for managing threats in your Kubernetes☆189Updated 2 months ago
- ☆269Updated 3 weeks ago