isovalent / eBPF-Summit-2022-CTFLinks
Capture The Flag Challenge for eBPF Summit 2022
☆18Updated 2 years ago
Alternatives and similar repositories for eBPF-Summit-2022-CTF
Users that are interested in eBPF-Summit-2022-CTF are comparing it to the libraries listed below
Sorting:
- ☆29Updated 4 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆22Updated 8 months ago
- ☆20Updated last month
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- ☆41Updated last month
- List of all previous CNCF Project's Security Audit Reports☆38Updated 4 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆40Updated last year
- Slack alert bot for matching Github Audit Events☆10Updated 7 months ago
- ☆34Updated last year
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 6 months ago
- ☆88Updated 3 weeks ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆31Updated last year
- Links and resources for the O'Reilly Kubernetes Security book☆44Updated 6 years ago
- Security Alert Decoration☆27Updated 2 months ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆37Updated 5 months ago
- ☆74Updated this week
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- Falco plugins registry☆97Updated last week
- Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent☆12Updated 2 years ago
- Resources for the O'Reilly Container Security book☆99Updated last month
- ☆98Updated 4 months ago
- A collection of Docker and Kubernetes resources☆18Updated 2 years ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆67Updated 6 months ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated 2 weeks ago
- ☆19Updated 3 weeks ago
- book website☆69Updated 3 years ago
- ☆21Updated 7 months ago
- ☆88Updated 11 months ago