OWASP / www-project-eks-goatLinks
OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defense labs with walkthrough.
☆18Updated last week
Alternatives and similar repositories for www-project-eks-goat
Users that are interested in www-project-eks-goat are comparing it to the libraries listed below
Sorting:
- ☆31Updated last month
- A tool to automatically give AWS IAM users access to your Kubernetes cluster.☆51Updated 3 weeks ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- Demo repository for running eBPF in GitHub Actions☆19Updated 2 months ago
- EKS NG AMI Updater is an open source project that can be used to update kubernetes node group images.☆28Updated last month
- Host Internal Static Website on AWS☆17Updated last year
- ☆21Updated 2 years ago
- Slack alert bot for matching Github Audit Events☆10Updated 6 months ago
- ☆24Updated 2 months ago
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆21Updated 2 months ago
- ☆20Updated 3 weeks ago
- Runtime security plug to protect user containers☆65Updated last month
- Collect IAM information from all your AWS organization, accounts, and resources.☆16Updated this week
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆46Updated 4 months ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆12Updated last month
- ☆33Updated 2 years ago
- Offensive Terraform Website☆44Updated 4 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆55Updated 5 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 4 months ago
- Sample of a networking costs calculator, helping to estimate the networking costs such as Data Transfer, Transit Gateway Attachments, NAT…☆99Updated 5 months ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated last month
- CloudSplaining on AWS Managed Policies☆43Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 9 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last month
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Python script to analyze and extract all Security Groups information☆43Updated 11 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- ☆16Updated 10 months ago
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆17Updated this week