genuinetools / amicontainedLinks
Container introspection tool. Find out what container runtime is being used as well as features available.
☆1,066Updated 5 years ago
Alternatives and similar repositories for amicontained
Users that are interested in amicontained are comparing it to the libraries listed below
Sorting:
- Custom & better AppArmor profile generator for Docker containers.☆1,226Updated 5 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆674Updated 2 years ago
- A stupid game for learning about containers, capabilities, and syscalls.☆904Updated 2 years ago
- Review Access - kubectl plugin to show an access matrix for k8s server resources☆1,384Updated 2 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆972Updated last year
- Autogenerate RBAC policies based on Kubernetes audit logs☆1,107Updated 2 years ago
- A tool to scan Kubernetes cluster for risky permissions☆1,413Updated 8 months ago
- A service that analyzes docker images and scans for vulnerabilities☆1,592Updated 3 years ago
- Docker containers vulnerability scan☆861Updated 11 months ago
- Security risk analysis for Kubernetes resources☆1,433Updated this week
- Scan your container images for package vulnerabilities with Aqua Security☆860Updated 4 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,413Updated last week
- Network security testing for Kubernetes DevSecOps workflows☆380Updated this week
- Show who has RBAC permissions to perform actions on different resources in Kubernetes☆894Updated last year
- A collection of manifests that will create pods with elevated privileges.☆671Updated 3 weeks ago
- Integration of Clair and Docker Registry☆505Updated 2 years ago
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,372Updated last week
- A client for kubelet☆868Updated 5 months ago
- Kubernetes security tool for policy enforcement☆444Updated 3 years ago
- Hunt for security weaknesses in Kubernetes clusters☆4,989Updated last year
- Kubernetes RBAC static analysis & visualisation tool☆735Updated 3 weeks ago
- k8s audit repo☆229Updated 6 years ago
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆200Updated 7 years ago
- Kubernetes security notes and best practices☆726Updated 3 years ago
- Kubernetes without the root privileges☆946Updated last month
- Security risk analysis for Kubernetes resources☆516Updated last year
- 💰💸☁️ For those interested in running Kubernetes in highly regulated environments, particularly financial services☆312Updated 3 years ago
- Deploy-time Policy Enforcer for Kubernetes applications☆707Updated last month
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆221Updated 11 months ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆211Updated 4 years ago