google / ctrdac
☆11Updated last month
Alternatives and similar repositories for ctrdac:
Users that are interested in ctrdac are comparing it to the libraries listed below
- ☆10Updated 2 months ago
- ☆67Updated last month
- egrets monitors egress☆46Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- A repository to store Rad Fingerprinting data.☆23Updated 7 months ago
- Publications from the eBPF foundation☆22Updated 4 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆71Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 3 weeks ago
- ☆25Updated 10 months ago
- ☆86Updated 8 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆64Updated 3 weeks ago
- vexctl is a tool to attest VEX impact statements☆44Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 6 months ago
- Kubernetes offensive framework built in eBPF☆37Updated last year
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆40Updated last year
- ☆21Updated 3 months ago
- ☆35Updated 4 months ago
- ☆15Updated 7 months ago
- TACOS framework structural details☆20Updated last year
- ☆53Updated last week
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆39Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Updated this week
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆80Updated 2 months ago
- Automated testing, generation & manipulation of #osquery packs☆72Updated 4 months ago
- ☆27Updated 3 months ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆22Updated 11 months ago