keikoproj / kube-forensicsLinks
☆228Updated 5 months ago
Alternatives and similar repositories for kube-forensics
Users that are interested in kube-forensics are comparing it to the libraries listed below
Sorting:
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆209Updated 4 years ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆395Updated 2 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- Network security testing for Kubernetes DevSecOps workflows☆377Updated last month
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆365Updated 2 months ago
- Scan Kubernetes resource files , and helm charts for security configurations issues and best practices.☆206Updated 2 years ago
- Kubernetes audit logging, when you don't control the control plane☆85Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 6 months ago
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆203Updated 4 years ago
- Tool for auditing RBACs in Kubernetes☆224Updated last year
- Kubernetes security tool for policy enforcement☆444Updated 2 years ago
- Notice: Postee is no longer under active development or maintenance.☆208Updated last month
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆401Updated 4 years ago
- ☆56Updated last week
- Documenting your Threat Models with HCL☆433Updated 4 months ago
- Response Engine for managing threats in your Kubernetes☆170Updated 2 weeks ago
- GCP CSPM using Google Sheets☆37Updated 6 months ago
- Dynamic Application and API Security Testing☆193Updated 2 years ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆108Updated 4 months ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆175Updated last month
- ☆122Updated 4 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆106Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆85Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆334Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 6 months ago
- Kubernetes Common Configuration Scoring System☆123Updated 3 years ago
- Take automated actions against threats and vulnerabilities.☆214Updated 2 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago