Metarget / awesome-cloud-native-securityLinks
awesome resources about cloud native security 🐿
☆324Updated 2 years ago
Alternatives and similar repositories for awesome-cloud-native-security
Users that are interested in awesome-cloud-native-security are comparing it to the libraries listed below
Sorting:
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆301Updated 4 years ago
- A penetration toolkit for container environment☆122Updated last week
- ☆179Updated 3 years ago
- Web application build Golang with Vulnerability☆253Updated 3 years ago
- Cloud Native Security News☆66Updated last year
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆419Updated 3 years ago
- TerraformGoat is HXSecurity research lab's "Vulnerable by Design" multi cloud deployment tool.☆626Updated 3 years ago
- 静态分析及代码审计自动化相关资料收集☆298Updated 3 years ago
- CloudRec is an open source multi-cloud security posture management (CSPM) platform designed to help organizations improve the security of…☆175Updated 2 weeks ago
- 一个由长亭自研,直观而可扩展的容器安全 SDK☆122Updated 2 years ago
- Security & Development☆271Updated 2 years ago
- Metarget is a framework providing automatic constructions of vulnerable infrastructures.☆1,366Updated 9 months ago
- 《深入理解SAST静态应用安全测试》Static Application Security Testing.☆388Updated 4 months ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆100Updated 5 years ago
- Corax for Java: A general static analysis framework for java code checking.☆254Updated last year
- collections of container escape techniques 🐿☆73Updated 4 years ago
- 安全导图☆262Updated 2 years ago
- 🌶 一些和容器化/容器编排/服务网格等技术相关的安全代码片段[自用备份]☆82Updated 4 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆20Updated last year
- Academic papers and articles that I read related to web hacking, fuzzing, etc. / 阅读过的Web安全方向、模糊测试方向的一些论文与阅读笔记☆379Updated 2 years ago
- Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)☆305Updated last year
- CVE Data Analysis, CVE Monitor, CVE EXP Prediction Based on Deep Learning. 1999-2020年存量CVE数据分析、监控CVE增量更新、基于深度学习的CVE EXP预测和自动化推送☆175Updated 2 years ago
- 《云原生安全:攻防实践与体系构建》资料仓库☆781Updated 2 years ago
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆104Updated 8 months ago
- Low-level RASP: Protecting Applications Implemented in High-level Programming Languages☆69Updated 3 months ago
- ☆38Updated 4 years ago
- xAST评价体系,让安全工具不再“黑盒”. The xAST evaluation benchmark makes security tools no longer a "black box".☆460Updated 3 weeks ago
- GitHub Satellite 2020 workshops on finding security vulnerabilities with CodeQL for Java/JavaScript.☆211Updated last year
- 记录学习codeql的过程☆394Updated 2 years ago
- 《深入理解Semgrep》Finding vulnerabilities with Semgrep.☆58Updated 2 years ago