isovalent / eBPF-Summit-2022-CTF
Capture The Flag Challenge for eBPF Summit 2022
☆18Updated 2 years ago
Alternatives and similar repositories for eBPF-Summit-2022-CTF:
Users that are interested in eBPF-Summit-2022-CTF are comparing it to the libraries listed below
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆79Updated last month
- A collection of Docker and Kubernetes resources☆18Updated 2 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 2 months ago
- ☆25Updated 9 months ago
- ☆11Updated last year
- Publications from the eBPF foundation☆22Updated 3 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆20Updated 4 months ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- Labs for Threat Modelling training delivered by ControlPlane☆30Updated 9 months ago
- ☆62Updated 3 weeks ago
- Security Alert Decoration☆26Updated 3 weeks ago
- a tool to audit the istio service mesh☆174Updated 3 years ago
- ☆21Updated 3 months ago
- ☆29Updated 3 weeks ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆118Updated this week
- Evolution process of The Falco Project☆50Updated this week
- CloudSplaining on AWS Managed Policies☆41Updated this week
- A repository to store Rad Fingerprinting data.☆23Updated 6 months ago
- ☆20Updated 9 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 4 months ago
- Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.☆62Updated last year
- ☆92Updated 2 weeks ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆36Updated 10 months ago
- ☆34Updated last year
- ☆80Updated 2 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆36Updated last month
- Links and resources for the O'Reilly Kubernetes Security book☆42Updated 6 years ago