genuinetools / amicontainedLinks
Container introspection tool. Find out what container runtime is being used as well as features available.
☆1,051Updated 4 years ago
Alternatives and similar repositories for amicontained
Users that are interested in amicontained are comparing it to the libraries listed below
Sorting:
- Custom & better AppArmor profile generator for Docker containers.☆1,215Updated 5 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆671Updated last year
- A stupid game for learning about containers, capabilities, and syscalls.☆905Updated 2 years ago
- A tool to scan Kubernetes cluster for risky permissions☆1,399Updated 3 months ago
- Network security testing for Kubernetes DevSecOps workflows☆377Updated 2 weeks ago
- Review Access - kubectl plugin to show an access matrix for k8s server resources☆1,366Updated 2 years ago
- Autogenerate RBAC policies based on Kubernetes audit logs☆1,103Updated 2 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆955Updated last year
- Security risk analysis for Kubernetes resources☆1,389Updated last week
- A service that analyzes docker images and scans for vulnerabilities☆1,588Updated 2 years ago
- Docker containers vulnerability scan☆859Updated 7 months ago
- Show who has RBAC permissions to perform actions on different resources in Kubernetes☆879Updated last year
- A collection of manifests that will create pods with elevated privileges.☆647Updated 3 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,358Updated last month
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,368Updated last week
- k8s audit repo☆229Updated 6 years ago
- Hunt for security weaknesses in Kubernetes clusters☆4,935Updated last year
- Kubernetes security tool for policy enforcement☆444Updated 2 years ago
- RBAC in Kubernetes visualizer☆402Updated 4 years ago
- Scan your container images for package vulnerabilities with Aqua Security☆858Updated 4 years ago
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆200Updated 6 years ago
- A client for kubelet☆825Updated last month
- 💰💸☁️ For those interested in running Kubernetes in highly regulated environments, particularly financial services☆308Updated 3 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆210Updated 4 years ago
- Kubernetes security notes and best practices☆725Updated 3 years ago
- Deploy-time Policy Enforcer for Kubernetes applications☆708Updated 5 months ago
- Kubernetes RBAC static analysis & visualisation tool☆727Updated last week
- A Blazing fast Security Auditing tool for Kubernetes☆1,002Updated last year
- Kubernetes Security - Best Practice Guide☆2,711Updated 6 years ago
- Security risk analysis for Kubernetes resources☆513Updated 7 months ago