dynatrace-oss / koneyLinks
Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.
☆72Updated 2 weeks ago
Alternatives and similar repositories for koney
Users that are interested in koney are comparing it to the libraries listed below
Sorting:
- Response Engine for managing threats in your Kubernetes☆173Updated 3 weeks ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆444Updated last month
- KBOM - Kubernetes Bill of Materials☆320Updated 2 months ago
- Kubernetes Stranger Danger☆66Updated last month
- This repository contains the container image scanning tool ORCA☆41Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 9 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆245Updated last month
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆366Updated 2 months ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆110Updated 4 months ago
- ☆102Updated 8 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆86Updated last year
- ☆22Updated 2 months ago
- KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and files…☆40Updated last year
- Connect Falco to your ecosystem☆623Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 6 months ago
- A collection of tools to improve your containerized apps security posture☆149Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆397Updated 2 years ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Validate the isolation posture of your container environment.☆300Updated 2 months ago
- Kubernetes audit logging, when you don't control the control plane☆85Updated last week
- Falco rule repository☆138Updated this week
- The Kubernetes Security Profiles Operator☆794Updated this week
- BadRobot - Operator Security Audit Tool☆223Updated last week
- ☆228Updated 6 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆467Updated last year
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆223Updated last month
- Software Bill of Behaviour: A vendor-supplied profile of runtime behaviors for software, designed to be distributed directly within OCI a…☆40Updated this week
- ☆182Updated 5 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆84Updated last year