Magier / RanLinks
Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a collection for known attack vectors.
☆25Updated 2 weeks ago
Alternatives and similar repositories for Ran
Users that are interested in Ran are comparing it to the libraries listed below
Sorting:
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 10 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆87Updated last year
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆245Updated 2 months ago
- Response Engine for managing threats in your Kubernetes☆180Updated this week
- ☆22Updated 3 months ago
- This repository contains the container image scanning tool ORCA☆42Updated 2 months ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆49Updated last month
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Updated 2 years ago
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Updated this week
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆120Updated last month
- Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotat…☆76Updated 2 weeks ago
- ☆84Updated last week
- ☆182Updated 6 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated 2 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆190Updated last month
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Updated last year
- Simple root privilege escalation detection using eBPF 🐝☆34Updated last month
- Runtime detection and response for malicious events in Kubernetes workloads☆46Updated last year
- Runtime Security Solution for your CI/CD Pipeline☆110Updated 4 months ago
- Run Falco in a GitHub Actions to detect suspicious behavior in your CI/CD☆42Updated 3 weeks ago
- KBOM - Kubernetes Bill of Materials☆321Updated 3 months ago
- Validate the isolation posture of your container environment.☆303Updated 2 months ago
- Kubernetes audit logging, when you don't control the control plane☆88Updated this week
- ☆44Updated 5 months ago
- ☆103Updated 9 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 7 months ago
- #supply #chain #attack #detection☆564Updated last week
- BadRobot - Operator Security Audit Tool☆223Updated 3 weeks ago