jp-gouin / multi-cluster-supply-chain
☆16Updated 9 months ago
Alternatives and similar repositories for multi-cluster-supply-chain:
Users that are interested in multi-cluster-supply-chain are comparing it to the libraries listed below
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 7 months ago
- ☆72Updated 3 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 3 weeks ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated 3 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆21Updated this week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated last year
- ☆39Updated 5 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 7 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 3 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆65Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆23Updated 3 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- ☆35Updated 8 months ago
- ☆20Updated 11 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆47Updated last month
- Outil de sécurité des architectures kubernetes avancées☆50Updated 5 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated last month
- ☆21Updated 5 months ago
- ☆57Updated last year
- ☆176Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 6 months ago
- ☆46Updated 10 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆46Updated 11 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆40Updated last year
- ☆42Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆17Updated 2 months ago
- ☆29Updated 5 months ago