isovalent / eBPF-Summit-2022-CTFLinks
Capture The Flag Challenge for eBPF Summit 2022
☆19Updated 3 years ago
Alternatives and similar repositories for eBPF-Summit-2022-CTF
Users that are interested in eBPF-Summit-2022-CTF are comparing it to the libraries listed below
Sorting:
- ☆103Updated 2 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- ☆28Updated 8 months ago
- docker image with useful network and container tools and SSH☆69Updated last year
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Updated 3 years ago
- List of all previous CNCF Project's Security Audit Reports☆38Updated 5 years ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆114Updated 8 months ago
- book website☆72Updated 3 years ago
- ☆35Updated 3 weeks ago
- ☆86Updated 3 weeks ago
- Resources for the O'Reilly Container Security book☆117Updated 3 months ago
- Demos for several kubernetes security features☆64Updated last year
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆211Updated 4 years ago
- Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.☆78Updated 2 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆149Updated 2 weeks ago
- a tool to audit the istio service mesh☆174Updated 4 years ago
- Kubernetes Stranger Danger☆68Updated 3 weeks ago
- ☆44Updated 8 months ago
- K8s API Honeypot with Active Defense Capabilities☆44Updated 2 years ago
- ☆29Updated last year
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Updated 2 years ago
- A collection of tools to improve your containerized apps security posture☆150Updated last year
- ☆22Updated 6 months ago
- Labs for Threat Modelling training delivered by ControlPlane☆35Updated last year
- A deliberately vulnerable Kubernetes cluster☆131Updated 2 years ago
- Falco plugins registry☆112Updated this week
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Evolution process of The Falco Project☆59Updated last week
- Kubernetes security and vulnerability tools and utilities.☆57Updated 4 years ago