jatrost / awesome-kubernetes-threat-detectionLinks
A curated list of resources about detecting threats and defending Kubernetes systems.
☆383Updated last year
Alternatives and similar repositories for awesome-kubernetes-threat-detection
Users that are interested in awesome-kubernetes-threat-detection are comparing it to the libraries listed below
Sorting:
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆285Updated 9 months ago
- ☆178Updated last month
- Threat matrix for CI/CD Pipeline☆751Updated 10 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆278Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆112Updated 8 months ago
- Documenting your Threat Models with HCL☆430Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆329Updated last month
- 🧰 Multi Tool Kubernetes Pentest Image☆233Updated last month
- ☆248Updated 8 months ago
- A deliberately vulnerable Kubernetes cluster☆125Updated last year
- A full insecure kubernetes application for testing security tools☆87Updated last month
- Tool for building Kubernetes attack paths☆873Updated 2 weeks ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆297Updated 2 years ago
- A list of cloud security tools and vendors.☆166Updated 8 months ago
- OWASP Foundation Web Respository☆585Updated last year
- Curating Falco rules with MITRE ATT&CK Matrix☆80Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆140Updated 2 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆237Updated last month
- Generate datasets of cloud audit logs for common attacks☆215Updated 9 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆74Updated last year
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆165Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆349Updated last month
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆346Updated last week
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆475Updated 3 years ago
- This is a companion to the Security Engineer Questions☆203Updated last year
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆205Updated 3 weeks ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- ☆387Updated last year