Metarget / awesome-cloud-native-security
awesome resources about cloud native security 🐿
☆316Updated last year
Alternatives and similar repositories for awesome-cloud-native-security:
Users that are interested in awesome-cloud-native-security are comparing it to the libraries listed below
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆289Updated 3 years ago
- ☆167Updated 2 years ago
- TerraformGoat is HXSecurity research lab's "Vulnerable by Design" multi cloud deployment tool.☆584Updated 2 years ago
- A penetration toolkit for container environment☆77Updated last week
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- Web application build Golang with Vulnerability☆249Updated 2 years ago
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆401Updated 2 years ago
- Metarget is a framework providing automatic constructions of vulnerable infrastructures.☆1,235Updated 3 weeks ago
- Cloud Native Security News☆63Updated 4 months ago
- 🌶 一些和容器化/容器编排/服务网格等技术相关的安全代码片段[自用备份]☆81Updated 3 years ago
- Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)☆292Updated 5 months ago
- 红蓝对抗量化评估系统(Red Team Assessment Scoring System)☆201Updated 2 years ago
- Security & Development☆265Updated last year
- Linux Eelvation(持续更新)☆399Updated 2 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- collections of container escape techniques 🐿☆68Updated 4 years ago
- A static analysis of vulnerabilities, Docker and Kubernetes cluster configuration detect toolkit based on the real penetration of cloud c…☆197Updated last month
- ☆245Updated 8 months ago
- CVE Data Analysis, CVE Monitor, CVE EXP Prediction Based on Deep Learning. 1999-2020年存量CVE数据分析、监控CVE增量更新、基于深度学习的CVE EXP预测和自动化推送☆174Updated last year
- A webshell and a normal file that have the same MD5☆188Updated 3 years ago
- 安全运营部署指南(wazuh部署指南)☆141Updated last year
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆16Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆344Updated last month
- 云原生安全资料库☆130Updated 3 months ago
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆89Updated 3 weeks ago
- 一个由长亭自研,直观而可扩展的容器安全 SDK☆121Updated last year
- java memory web shell extracting tool☆436Updated 3 years ago
- NVD, Ubuntu, Alpine☆428Updated this week
- Code-Breaking Puzzles