Magier / RanLinks
Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a collection for known attack vectors.
☆29Updated this week
Alternatives and similar repositories for Ran
Users that are interested in Ran are comparing it to the libraries listed below
Sorting:
- Response Engine for managing threats in your Kubernetes☆186Updated last month
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 11 months ago
- ☆22Updated 4 months ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆112Updated 6 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆250Updated 3 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆124Updated 2 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- Runtime detection and response for malicious events in Kubernetes workloads☆46Updated last year
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Updated this week
- Intent driven security automation framework☆26Updated 4 months ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆49Updated last week
- Run Falco in a GitHub Actions to detect suspicious behavior in your CI/CD☆42Updated 2 months ago
- KBOM - Kubernetes Bill of Materials☆323Updated 4 months ago
- ☆85Updated last month
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Updated 2 years ago
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Updated 2 years ago
- Publications from the eBPF foundation☆28Updated 2 weeks ago
- ☆44Updated 7 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆42Updated last year
- Software Bill of Behaviour: A vendor-supplied profile of runtime behaviors for software, designed to be distributed directly within OCI a…☆44Updated last month
- This repository contains the container image scanning tool ORCA☆42Updated 3 months ago
- Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotat…☆83Updated 2 weeks ago
- Runtime Security Solution for your CI/CD Pipeline☆112Updated last month
- A tool to create, transform and attest VEX metadata☆168Updated last week
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆190Updated 3 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- Falco rule repository☆149Updated this week
- Falco plugins registry☆110Updated last week
- Kubernetes Operator for Falco☆13Updated this week