Threat Modeling (based on STRIDE approach) for Kubernetes systems.
☆25Oct 14, 2024Updated last year
Alternatives and similar repositories for k8sthreatmodeling
Users that are interested in k8sthreatmodeling are comparing it to the libraries listed below
Sorting:
- KubeArmor runtime security integration with Open Horizon☆13Jan 23, 2026Updated last month
- Gather information about your system quickly, intuitively, and easily.☆15Updated this week
- Terraform provider for evaluting CUE to render JSON☆14Updated this week
- Kubernetes Helm Charts to run Parca and Parca Agent☆19Feb 4, 2026Updated last month
- k8tls (pronounced cattles), to assess server port security by detecting its TLS and certificates configuration.☆20Jan 27, 2026Updated last month
- Ebpf faqs, samples, tooling☆45Jul 1, 2021Updated 4 years ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆32Feb 7, 2023Updated 3 years ago
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆28Sep 2, 2024Updated last year
- provides the time in minutes until the next departure☆20Feb 18, 2025Updated last year
- ☆23Mar 13, 2023Updated 2 years ago
- Giant Swarm Prometheus alerting and recording rules☆27Mar 2, 2026Updated last week
- A Go daemon that provides a Prometheus Remote Read/Write interface on top of Clickhouse☆24May 28, 2024Updated last year
- All our dashboards for Grafana☆26Updated this week
- Intent driven security automation framework☆27Aug 12, 2025Updated 6 months ago
- human-friendly OpenTelemetry CLI☆38Jul 8, 2024Updated last year
- Container Level Energy-efficient VPA Recommender☆27Oct 9, 2025Updated 5 months ago
- Tracking Kubernetes Operators out in the wild.☆31Nov 8, 2024Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Fast multi-cluster navigation for K8s admins☆13Jul 19, 2024Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆90Mar 2, 2026Updated last week
- Operator, container and Helm chart to deploy Vertica in Kubernetes☆50Feb 27, 2026Updated last week
- Labs for Threat Modelling training delivered by ControlPlane☆35Feb 24, 2026Updated last week
- A simple tool for converting Rego (OPA) rule into command.☆30Jun 1, 2022Updated 3 years ago
- Scan your account for the use of untrusted AMIs☆32Updated this week
- ☆10Sep 24, 2021Updated 4 years ago
- Secure and performant OCI-image builder for Kubernetes☆12Updated this week
- ☆35Nov 19, 2021Updated 4 years ago
- K8s API Honeypot with Active Defense Capabilities☆44Jan 7, 2024Updated 2 years ago
- This operator will manage and configure data processing unit (DPUs) to be used in accelerating/offloading k8s networking functions☆12Feb 13, 2026Updated 3 weeks ago
- A Golang Prometheus back-filling library☆10May 30, 2023Updated 2 years ago
- Repository with Custom Resource Definition files for validation purposes☆14Updated this week
- Bugs Framework☆10Updated this week
- Kubernetes Autoscaling operator☆15Jun 11, 2024Updated last year
- ☆10Mar 6, 2023Updated 3 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Install and configure mssql on your system.☆10Dec 22, 2023Updated 2 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- k8s operator for managing serial devices.☆41Feb 20, 2026Updated 2 weeks ago