Magier / RanLinks
Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a collection for known attack vectors.
☆29Updated 2 weeks ago
Alternatives and similar repositories for Ran
Users that are interested in Ran are comparing it to the libraries listed below
Sorting:
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- Response Engine for managing threats in your Kubernetes☆189Updated 2 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆43Updated last year
- ☆22Updated 6 months ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆50Updated last month
- Runtime detection and response for malicious events in Kubernetes workloads☆46Updated last year
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆43Updated last month
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Updated last month
- Kubernetes audit logging, when you don't control the control plane☆90Updated this week
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Updated 2 years ago
- KBOM - Kubernetes Bill of Materials☆323Updated 6 months ago
- ☆44Updated 8 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆252Updated 5 months ago
- BadRobot - Operator Security Audit Tool☆223Updated last week
- Software Bill of Behaviour: A vendor-supplied profile of runtime behaviors for software, designed to be distributed directly within OCI a…☆46Updated last week
- Generate a variety of suspect actions that are detected by Falco rulesets☆115Updated 8 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).