bgeesaman / malicious-complianceLinks
Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"
☆67Updated last year
Alternatives and similar repositories for malicious-compliance
Users that are interested in malicious-compliance are comparing it to the libraries listed below
Sorting:
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆98Updated 5 months ago
- ☆96Updated 4 months ago
- BadRobot - Operator Security Audit Tool☆220Updated this week
- Response Engine for managing threats in your Kubernetes☆160Updated this week
- Kubernetes audit logging, when you don't control the control plane☆81Updated this week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated 2 weeks ago
- 🧰 Multi Tool Kubernetes Pentest Image☆233Updated last month
- ☆21Updated 6 months ago
- Runtime detection and response for malicious events in Kubernetes workloads☆45Updated last year
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Runtime security plug to protect user containers☆65Updated last month
- KBOM - Kubernetes Bill of Materials☆315Updated 2 months ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- sigstore the hard way!☆111Updated last year
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Updated last year
- A replacement for "kubectl exec" that works over WebSocket connections.☆39Updated last year
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆156Updated this week
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆201Updated last week
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- Scans SBOMs for vulnerabilities with Grype☆82Updated last week
- ☆236Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆345Updated 2 months ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated 2 years ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆44Updated 2 months ago
- ☆72Updated 3 weeks ago
- ☆54Updated this week
- (d)ocker(f)ile (c)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆65Updated this week
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆140Updated 2 months ago