aquasecurity / kube-hunterLinks
Hunt for security weaknesses in Kubernetes clusters
☆4,881Updated last year
Alternatives and similar repositories for kube-hunter
Users that are interested in kube-hunter are comparing it to the libraries listed below
Sorting:
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,527Updated this week
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,366Updated 2 months ago
- Security risk analysis for Kubernetes resources☆1,341Updated last week
- A tool to scan Kubernetes cluster for risky permissions☆1,389Updated 3 weeks ago
- Validation of best practices in your Kubernetes clusters☆3,261Updated this week
- A service that analyzes docker images and scans for vulnerabilities☆1,587Updated 2 years ago
- Kubernetes object analysis with recommendations for improved reliability and security. kube-score actively prevents downtime and bugs in …☆2,910Updated last month
- Cloud Native Runtime Security☆8,000Updated this week
- 🐊 Gatekeeper - Policy Controller for Kubernetes☆3,911Updated last week
- KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adh…☆3,202Updated this week
- A Blazing fast Security Auditing tool for Kubernetes☆998Updated last year
- 👀 A Kubernetes cluster resource sanitizer☆5,887Updated this week
- OpenClarity is an open source platform built to enhance security and observability of cloud native applications and infrastructure☆1,415Updated this week
- Peirates - Kubernetes Penetration Testing tool☆1,330Updated last month
- Kubernetes Security - Best Practice Guide☆2,709Updated 5 years ago
- Write tests against structured configuration data using the Open Policy Agent Rego query language☆2,990Updated last week
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆4,818Updated 3 weeks ago
- Review Access - kubectl plugin to show an access matrix for k8s server resources☆1,348Updated 2 years ago
- Get your resource requests "Just Right"☆2,826Updated this week
- Vulnerability Static Analysis for Containers☆10,662Updated this week
- A cli tool to help discover deprecated apiVersions in Kubernetes☆2,315Updated this week
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,189Updated 2 weeks ago
- Kubernetes-native security toolkit☆1,533Updated this week
- A curated list for Awesome Kubernetes Security resources☆1,960Updated last year
- Kubectl plugin to ease sniffing on kubernetes pods using tcpdump and wireshark☆3,340Updated 10 months ago
- Tfsec is now part of Trivy☆6,836Updated 2 weeks ago
- Kubernetes Security Training Platform - focusing on security mitigation☆948Updated 9 months ago
- Autogenerate RBAC policies based on Kubernetes audit logs☆1,101Updated 2 years ago
- Linux Runtime Security and Forensics using eBPF☆3,922Updated 2 weeks ago
- Kubernetes Reboot Daemon☆2,312Updated this week