OWASP / www-project-kubernetes-top-tenView external linksLinks
OWASP Foundation Web Respository
☆600Nov 24, 2025Updated 2 months ago
Alternatives and similar repositories for www-project-kubernetes-top-ten
Users that are interested in www-project-kubernetes-top-ten are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Kubernetes security resources☆954Dec 15, 2023Updated 2 years ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆767Dec 11, 2024Updated last year
- Checklist for container security - devsecops practices☆1,611Sep 15, 2025Updated 5 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Feb 6, 2026Updated last week
- Peirates - Kubernetes Penetration Testing tool☆1,420Jan 20, 2026Updated 3 weeks ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆402Sep 2, 2023Updated 2 years ago
- OWASP Kubernetes Security Testing Guide☆41Dec 22, 2025Updated last month
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,967May 20, 2025Updated 8 months ago
- A curated list for Awesome Kubernetes Security resources☆1,989Nov 28, 2025Updated 2 months ago
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,409Nov 18, 2025Updated 2 months ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆598Feb 10, 2026Updated last week
- Threat matrix for CI/CD Pipeline☆760Jul 8, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Updated this week
- A Blazing fast Security Auditing tool for Kubernetes☆1,006Apr 6, 2024Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆350Mar 21, 2025Updated 10 months ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆590Nov 12, 2025Updated 3 months ago
- Security Remediation Guides☆745Nov 24, 2025Updated 2 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,029Dec 21, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,855Oct 1, 2025Updated 4 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,214Feb 3, 2025Updated last year
- OWASP Foundation Web Respository☆56Oct 4, 2025Updated 4 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆428Oct 29, 2024Updated last year
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 4 months ago
- ☆271Jan 14, 2026Updated last month
- ☆73May 13, 2025Updated 9 months ago
- Kubernetes Security Training Platform - focusing on security mitigation☆976Sep 2, 2024Updated last year
- Tool for building Kubernetes attack paths☆940Updated this week
- Network security testing for Kubernetes DevSecOps workflows☆382Jan 29, 2026Updated 2 weeks ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,507Feb 10, 2026Updated last week
- Hunt for security weaknesses in Kubernetes clusters☆5,000Mar 19, 2024Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆369Aug 1, 2025Updated 6 months ago
- Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security…☆11,177Feb 4, 2026Updated last week
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,510Jan 28, 2026Updated 2 weeks ago
- Runs checks to see if an EKS cluster follows EKS Best Practices.☆937Jan 16, 2026Updated last month
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,256Dec 8, 2025Updated 2 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,197Jul 14, 2024Updated last year