blacktop / seccomp-gen
Docker Secure Computing Profile Generator
☆48Updated 3 years ago
Alternatives and similar repositories for seccomp-gen:
Users that are interested in seccomp-gen are comparing it to the libraries listed below
- ☆25Updated 9 months ago
- Build custom Docker seccomp profiles for containers by finding syscalls it uses.☆89Updated 4 years ago
- A repository to store Rad Fingerprinting data.☆23Updated 7 months ago
- ☆27Updated 3 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- egrets monitors egress☆46Updated 4 years ago
- ☆29Updated last month
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- ☆21Updated 5 years ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆57Updated 3 years ago
- Kubernetes Easter CTF☆58Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- A Security Scanner for Go☆26Updated 6 years ago
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago
- ☆11Updated last month
- A beginner-friendly CTF about Kubernetes security.☆77Updated 2 years ago
- vexctl is a tool to attest VEX impact statements☆44Updated last year
- Writing a container in a few lines of Go code, as seen at DockerCon 2017 and on O'Reilly Safari☆40Updated 4 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- agent for handling seccomp descriptors for container runtimes☆44Updated last year
- ☆66Updated last month
- An query language and interactive tooling to work with SBOM data.☆14Updated 4 months ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Updated 5 years ago
- Variety of kubectl krew tools usually security focused☆32Updated last year
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆71Updated last year
- ☆28Updated 4 years ago