ancat / egrets
egrets monitors egress
☆45Updated 5 years ago
Alternatives and similar repositories for egrets:
Users that are interested in egrets are comparing it to the libraries listed below
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- ☆27Updated 5 months ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago
- ☆11Updated 3 months ago
- ☆72Updated this week
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 4 years ago
- A repository to store Rad Fingerprinting data.☆24Updated 9 months ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- ☆88Updated 10 months ago
- The Jolly Executioner - a simple command execution proxy☆16Updated 11 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- ☆28Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 8 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Modron - Cloud security compliance☆33Updated 4 months ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆55Updated 4 months ago
- ☆29Updated 3 months ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆14Updated 4 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 4 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Container for assorted volatility plugins.☆22Updated 11 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago