isovalent / eBPF-Summit-2022-CTF
Capture The Flag Challenge for eBPF Summit 2022
☆18Updated 2 years ago
Alternatives and similar repositories for eBPF-Summit-2022-CTF:
Users that are interested in eBPF-Summit-2022-CTF are comparing it to the libraries listed below
- ☆29Updated 2 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆21Updated 6 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 5 months ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- book website☆68Updated 3 years ago
- ☆96Updated 2 months ago
- Labs for Threat Modelling training delivered by ControlPlane☆31Updated last year
- Evolution process of The Falco Project☆52Updated this week
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 4 months ago
- ☆20Updated 11 months ago
- A collection of Docker and Kubernetes resources☆18Updated 2 years ago
- ☆25Updated 11 months ago
- List of all previous CNCF Project's Security Audit Reports☆38Updated 4 years ago
- ☆34Updated last year
- ☆19Updated 7 months ago
- ☆72Updated 3 months ago
- Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent☆12Updated 2 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated 2 weeks ago
- Publications from the eBPF foundation☆23Updated 5 months ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆66Updated 4 months ago
- Demos for several kubernetes security features☆63Updated 3 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆38Updated last year
- Generate a variety of suspect actions that are detected by Falco rulesets☆103Updated last month
- Security Alert Decoration☆27Updated this week
- Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.☆63Updated last year
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆37Updated 3 months ago
- ☆19Updated last month
- Simple root privilege escalation detection using eBPF 🐝☆12Updated 2 months ago