abdullahgarcia / kubernetes-for-socLinks
kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knowledge necessary to perform their critical duties.
β56Updated last year
Alternatives and similar repositories for kubernetes-for-soc
Users that are interested in kubernetes-for-soc are comparing it to the libraries listed below
Sorting:
- β84Updated this week
- π§° Multi Tool Kubernetes Pentest Imageβ245Updated 2 months ago
- β182Updated 6 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.β36Updated last year
- β72Updated last week
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.β189Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β111Updated 9 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSβ40Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ143Updated 9 months ago
- AttachΓ© provides an emulation layer for Cloud Provider IMDS APIsβ60Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation oβ¦β102Updated last year
- Generate datasets of cloud audit logs for common attacksβ221Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflowsβ112Updated 2 weeks ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this β¦β120Updated last month
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko geneβ¦β103Updated last year
- β31Updated 4 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.β116Updated last month
- HashiCorp-relevant rules for the Semgrep code analysis toolβ42Updated 2 years ago
- Automated testing, generation & manipulation of #osquery packsβ73Updated last year
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Clβ¦β170Updated last year
- AWS honey token managerβ89Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.β397Updated 2 years ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packagesβ171Updated this week
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context Pβ¦β133Updated 4 months ago
- K8s API Honeypot with Active Defense Capabilitiesβ42Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β87Updated last year
- β75Updated 7 months ago
- Clean accounts over permissions in GCP infra at scaleβ71Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ58Updated 2 years ago
- Compares and analyzes GCP IAM roles.β77Updated 7 months ago