isovalent / eBPF-Summit-2022-CTF
Capture The Flag Challenge for eBPF Summit 2022
☆18Updated 2 years ago
Alternatives and similar repositories for eBPF-Summit-2022-CTF
Users that are interested in eBPF-Summit-2022-CTF are comparing it to the libraries listed below
Sorting:
- ☆34Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆21Updated 7 months ago
- Publications from the eBPF foundation☆23Updated 6 months ago
- ☆25Updated last week
- ☆20Updated last week
- A replacement for "kubectl exec" that works over WebSocket connections.☆38Updated last year
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- ☆29Updated 3 months ago
- ☆72Updated this week
- ☆86Updated 2 months ago
- ☆88Updated 10 months ago
- The Falco Project Community☆55Updated last month
- Security Alert Decoration☆27Updated 3 weeks ago
- Kubernetes audit logging, when you don't control the control plane☆77Updated last week
- ☆21Updated 6 months ago
- Evolution process of The Falco Project☆52Updated this week
- Slack alert bot for matching Github Audit Events☆10Updated 6 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆55Updated 5 months ago
- ☆19Updated last month
- Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.☆64Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 7 months ago
- ☆19Updated 8 months ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆37Updated 4 months ago
- ☆96Updated 3 months ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Updated 2 years ago
- This repository contains the code used during my demo at BSidesNYC 2023 where I presented a new method for analysing volatile memory in G…☆1Updated 7 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆84Updated 4 months ago
- book website☆68Updated 3 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year