adavarski / HomeLab-k8s-DevSecOps-playgroundLinks
⚙ DevSecOps Kubernetes Playground ("A Hacker's Guide to Kubernetes")
☆17Updated 2 years ago
Alternatives and similar repositories for HomeLab-k8s-DevSecOps-playground
Users that are interested in HomeLab-k8s-DevSecOps-playground are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆191Updated 3 months ago
- ☆183Updated 8 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆250Updated 3 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆176Updated 11 months ago
- Kubernetes Stranger Danger☆67Updated 3 weeks ago
- Scan your account for the use of untrusted AMIs☆30Updated 2 weeks ago
- Curating Falco rules with MITRE ATT&CK Matrix☆86Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆69Updated 5 years ago
- ☆47Updated 4 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- ☆85Updated last month
- ☆63Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆74Updated 3 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 11 months ago
- ☆16Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆47Updated 4 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 11 months ago
- An AWS IAM Privilege Escalation Path Library☆37Updated last week
- ☆31Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- Awesome resources about Security in Kubernetes☆46Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆31Updated last month
- ☆44Updated 7 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆120Updated 2 years ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Leaky Vessels Dynamic Detector☆103Updated 8 months ago
- Create honeypots for cloud environments☆107Updated 2 months ago