adavarski / HomeLab-k8s-DevSecOps-playground
⚙ DevSecOps Kubernetes Playground ("A Hacker's Guide to Kubernetes")
☆14Updated 11 months ago
Related projects: ⓘ
- ☆42Updated 3 years ago
- ☆15Updated 2 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆74Updated 6 months ago
- WAF bypass PoC☆43Updated 11 months ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆63Updated 3 years ago
- ☆163Updated 2 months ago
- Determine privileges from cloud credentials via brute-force testing.☆63Updated 3 weeks ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆61Updated 11 months ago
- ☆12Updated last year
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆44Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆29Updated 5 months ago
- Python script to analyze and extract all Security Groups information☆41Updated 3 months ago
- Kubernetes Pwnage for all☆54Updated 3 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆88Updated 6 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆42Updated 8 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆56Updated 6 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆68Updated 7 months ago
- OWASP Foundation Web Respository☆37Updated 2 weeks ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆23Updated 2 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆166Updated last year
- ☆55Updated last year
- ☆30Updated this week
- Awesome resources about Security in Kubernetes☆40Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆28Updated 3 weeks ago
- ☆90Updated 4 months ago
- ☆39Updated 3 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆78Updated 7 months ago
- Vulnerable Kustomize Kubernetes templates for training and education☆47Updated 2 years ago
- ☆19Updated 5 months ago