blacktop / seccomp-gen
Docker Secure Computing Profile Generator
☆47Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for seccomp-gen
- Build custom Docker seccomp profiles for containers by finding syscalls it uses.☆89Updated 4 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- ☆29Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- Kubernetes Pwnage for all☆54Updated 4 years ago
- ☆24Updated 6 months ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- A repository to store Rad Fingerprinting data.☆23Updated 3 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆103Updated 5 years ago
- Kubernetes Easter CTF☆58Updated 4 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 6 months ago
- agent for handling seccomp descriptors for container runtimes☆42Updated 9 months ago
- egrets monitors egress☆45Updated 4 years ago
- ☆27Updated last week
- Provide a shell like interface by utilizing osquery's distributed API☆80Updated 4 years ago
- K8s API Honeypot with Active Defense Capabilities☆39Updated 10 months ago
- ☆28Updated 4 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Dynamic Outbound Firewall Authorizer☆21Updated 2 years ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆59Updated 2 years ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆35Updated 7 months ago
- ☆9Updated 7 months ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆40Updated 4 years ago
- Evolution process of The Falco Project☆48Updated this week
- Example program using eBPF to log data being based in using shell pipes☆40Updated 3 years ago
- ☆21Updated 4 years ago
- ☆66Updated 3 weeks ago