awslabs / k8s-network-policy-migratorView external linksLinks
K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool offers features like pre-migration checks, policy collection and conversion, as well as easy validate, apply, rollback, and cleanup options
☆32Aug 29, 2023Updated 2 years ago
Alternatives and similar repositories for k8s-network-policy-migrator
Users that are interested in k8s-network-policy-migrator are comparing it to the libraries listed below
Sorting:
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- ☆28May 12, 2025Updated 9 months ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆43Jan 6, 2026Updated last month
- ☆30Jan 12, 2023Updated 3 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- ☆16Jul 3, 2025Updated 7 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Python interface for Apple Keynote 09 files☆18May 22, 2016Updated 9 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- A security-first linter for code that shouldn't need linting☆17Sep 12, 2023Updated 2 years ago
- ☆19Nov 10, 2023Updated 2 years ago
- A service to automatically manage Bottlerocket updates in an Amazon ECS cluster.☆49Jan 26, 2026Updated 3 weeks ago
- An admission controller service and kubectl plugin to handle container drift in K8s clusters☆125Dec 2, 2021Updated 4 years ago
- ☆27May 6, 2024Updated last year
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Feb 8, 2026Updated last week
- ☆142Nov 24, 2025Updated 2 months ago
- Service Control Policies that have been Latacora recommended all wrapped up in terraform that is easy to attach to an OU.☆27May 24, 2024Updated last year
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Dec 15, 2025Updated 2 months ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆369Aug 1, 2025Updated 6 months ago
- Kubernetes scheduler written in less than 100 lines of bash☆199Feb 10, 2023Updated 3 years ago
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Apr 3, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Real time Kubernetes issues and vulnerabilities scanning☆30Feb 10, 2026Updated last week
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated 3 weeks ago
- ☆24May 31, 2024Updated last year
- Exploring routing topologies using Transit Gateway☆23Oct 10, 2019Updated 6 years ago
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- Automatic Identification of Cryptographic Primitives in Software☆31Mar 14, 2015Updated 10 years ago
- EKS NG AMI Updater is an open source project that can be used to update kubernetes node group images.☆28Updated this week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Sep 12, 2023Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- ☆29Jan 31, 2025Updated last year
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago