dynatrace-oss / koneyLinks
Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.
☆84Updated last week
Alternatives and similar repositories for koney
Users that are interested in koney are comparing it to the libraries listed below
Sorting:
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆450Updated last month
- This repository contains the container image scanning tool ORCA☆42Updated 4 months ago
- Response Engine for managing threats in your Kubernetes☆187Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Software Bill of Behaviour: A vendor-supplied profile of runtime behaviors for software, designed to be distributed directly within OCI a…☆44Updated 2 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆251Updated 4 months ago
- KBOM - Kubernetes Bill of Materials☆323Updated 5 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Kubernetes Stranger Danger☆67Updated last month
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- Validate the isolation posture of your container environment.☆309Updated 2 weeks ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆194Updated 3 months ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆370Updated 5 months ago
- ☆104Updated last month
- Generate a variety of suspect actions that are detected by Falco rulesets☆114Updated 7 months ago
- ☆85Updated this week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- A collection of tools to improve your containerized apps security posture☆150Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- ☆245Updated 4 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- ☆183Updated 8 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆74Updated 8 months ago
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆104Updated last year
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆29Updated this week
- ☆22Updated 5 months ago
- Kubernetes audit logging, when you don't control the control plane☆90Updated last week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Updated 2 years ago
- Falco rule repository☆150Updated this week
- Falco plugins registry☆112Updated last week