Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).
☆89Jan 28, 2024Updated 2 years ago
Alternatives and similar repositories for Falco-bypasses
Users that are interested in Falco-bypasses are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of resources about detecting threats and defending Kubernetes systems.☆408Sep 2, 2023Updated 2 years ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆373Apr 1, 2026Updated 2 weeks ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- ☆73May 13, 2025Updated 11 months ago
- ☆25Jun 27, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Kubewarden website☆12Updated this week
- OCI hook to trace syscalls and generate a seccomp profile☆340Apr 12, 2026Updated last week
- Curating Falco rules with MITRE ATT&CK Matrix☆87Mar 7, 2024Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- Response Engine for managing threats in your Kubernetes☆196Updated this week
- Kubernetes focused container assessment and context discovery tool for penetration testing☆479Nov 7, 2025Updated 5 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,292Apr 9, 2026Updated last week
- Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent☆12Aug 13, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Runtime security plug to protect user containers☆67Updated this week
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated last year
- ☆110Mar 29, 2026Updated 2 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Sep 26, 2023Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Falco rule repository☆164Apr 10, 2026Updated last week
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- ☆30Jan 12, 2023Updated 3 years ago
- ☆53Mar 25, 2025Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated 2 months ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆118Feb 12, 2026Updated 2 months ago
- Pod Security Admission command line checker☆11Mar 14, 2026Updated last month
- ☆30May 12, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Go client and SDK for Falco☆55Mar 18, 2026Updated last month
- Tool for building Kubernetes attack paths☆958Apr 8, 2026Updated last week
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Apr 6, 2026Updated last week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆115Jan 2, 2025Updated last year
- ☆87Mar 30, 2026Updated 2 weeks ago
- ☆16May 15, 2024Updated last year
- Inject Falco and pdig into a running kubernetes pod☆13May 14, 2020Updated 5 years ago