chen-keinan / kube-knarkLinks
Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster
☆36Updated 3 years ago
Alternatives and similar repositories for kube-knark
Users that are interested in kube-knark are comparing it to the libraries listed below
Sorting:
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 7 months ago
- ☆42Updated 2 months ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆37Updated 9 months ago
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- ☆21Updated 2 months ago
- ☆29Updated 5 months ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- ☆11Updated 5 months ago
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated last month
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- egrets monitors egress☆46Updated 5 years ago
- Dynamic Outbound Firewall Authorizer☆22Updated 3 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Updated 7 months ago
- Kit for building Falco drivers: kernel modules or eBPF probes☆65Updated 2 weeks ago
- DNS at ludicrous speed for Go, powered by XDP sockets. [EXPERIMENTAL]☆11Updated 2 weeks ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆14Updated 4 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 6 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 5 months ago
- A repository to store Rad Fingerprinting data.☆24Updated 11 months ago
- TACOS framework structural details☆20Updated 2 months ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Use eBPF to inject chaos into local processes☆64Updated 10 months ago
- An query language and interactive tooling to work with SBOM data.☆14Updated 9 months ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated this week
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Updated 5 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Tracing security events in container with BPF☆15Updated last year
- ☆74Updated 2 months ago
- Kubernetes Native, Runtime Container Image Scanning☆39Updated 3 years ago