abdullahgarcia / kubernetes-for-soc
kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knowledge necessary to perform their critical duties.
β53Updated last year
Alternatives and similar repositories for kubernetes-for-soc:
Users that are interested in kubernetes-for-soc are comparing it to the libraries listed below
- π§° Multi Tool Kubernetes Pentest Imageβ226Updated 6 months ago
- β68Updated last month
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.β30Updated 5 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β80Updated 2 months ago
- β175Updated 4 months ago
- β42Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSβ39Updated 6 months ago
- β29Updated 4 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ138Updated 2 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixβ58Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.β130Updated 2 weeks ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.β69Updated 10 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ79Updated 2 years ago
- β72Updated this week
- Automated testing, generation & manipulation of #osquery packsβ72Updated 5 months ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ39Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incideβ¦β147Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation oβ¦β91Updated last year
- Generate datasets of cloud audit logs for common attacksβ208Updated 7 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61Updated last year
- β112Updated 2 months ago
- Generates runbooks for GuardDuty findingsβ35Updated 8 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β52Updated last month
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflowsβ82Updated last week
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.β105Updated 5 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β46Updated 10 months ago
- Kubernetes audit logging, when you don't control the control planeβ71Updated this week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CKβ¦β164Updated 5 months ago
- Tool for obfuscating and deobfuscating data.β69Updated last year
- pocket guide for core detection engineering conceptsβ28Updated last year