isovalent / eBPF-Summit-2022-CTF
Capture The Flag Challenge for eBPF Summit 2022
☆18Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for eBPF-Summit-2022-CTF
- ☆29Updated 3 years ago
- ☆34Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆20Updated 3 weeks ago
- ☆91Updated 5 months ago
- ☆24Updated 6 months ago
- ☆20Updated 6 months ago
- A beginner-friendly CTF about Kubernetes security.☆76Updated 2 years ago
- ☆19Updated 7 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆55Updated 7 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 6 months ago
- book website☆66Updated 2 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 4 years ago
- Falco plugins registry☆85Updated this week
- Evolution process of The Falco Project☆48Updated this week
- Kubernetes audit logging, when you don't control the control plane☆65Updated this week
- Slack alert bot for matching Github Audit Events☆10Updated last week
- Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent☆12Updated 2 years ago
- OWASP Kubernetes Security Testing Guide☆37Updated 2 months ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- ☆12Updated 2 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆13Updated 2 years ago
- K8s API Honeypot with Active Defense Capabilities☆39Updated 10 months ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- docker image with useful network and container tools and SSH☆62Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated last year
- Demos for several kubernetes security features☆63Updated 3 years ago
- Docker Secure Computing Profile Generator☆47Updated 3 years ago
- Cloud Security Posture security policies☆7Updated last month
- ☆27Updated last week