isovalent / eBPF-Summit-2022-CTF
Capture The Flag Challenge for eBPF Summit 2022
☆18Updated 2 years ago
Alternatives and similar repositories for eBPF-Summit-2022-CTF:
Users that are interested in eBPF-Summit-2022-CTF are comparing it to the libraries listed below
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆21Updated 5 months ago
- Publications from the eBPF foundation☆23Updated 4 months ago
- ☆21Updated 4 months ago
- ☆20Updated 10 months ago
- ☆29Updated 2 months ago
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- book website☆67Updated 3 years ago
- ☆25Updated 10 months ago
- ☆93Updated last month
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- List of all previous CNCF Project's Security Audit Reports☆38Updated 4 years ago
- A collection of Docker and Kubernetes resources☆18Updated 2 years ago
- Evolution process of The Falco Project☆50Updated this week
- ☆69Updated 2 months ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- Security Alert Decoration☆27Updated last week
- ☆16Updated 2 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- Demos for several kubernetes security features☆63Updated 2 months ago
- The Falco Project Community☆54Updated this week
- A replacement for "kubectl exec" that works over WebSocket connections.☆38Updated last year
- Slack alert bot for matching Github Audit Events☆10Updated 4 months ago
- egrets monitors egress☆45Updated 4 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- ☆34Updated last year
- Resources for the O'Reilly Container Security book☆97Updated 4 months ago
- ☆27Updated 4 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 5 months ago