keikoproj / kube-forensicsLinks
☆230Updated 8 months ago
Alternatives and similar repositories for kube-forensics
Users that are interested in kube-forensics are comparing it to the libraries listed below
Sorting:
- A curated list of resources about detecting threats and defending Kubernetes systems.☆400Updated 2 years ago
- Network security testing for Kubernetes DevSecOps workflows☆379Updated last month
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆211Updated 4 years ago
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆202Updated 4 years ago
- Scan Kubernetes resource files , and helm charts for security configurations issues and best practices.☆205Updated 2 years ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆174Updated last month
- Documenting your Threat Models with HCL☆440Updated last month
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆367Updated 4 months ago
- Dynamic Application and API Security Testing☆193Updated 2 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Tool for auditing RBACs in Kubernetes☆226Updated last year
- A deliberately vulnerable Kubernetes cluster☆130Updated 2 years ago
- Kubernetes security tool for policy enforcement☆444Updated 2 years ago
- Notice: Postee is no longer under active development or maintenance.☆208Updated 3 months ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆112Updated 6 months ago
- Kubernetes audit logging, when you don't control the control plane☆90Updated this week
- Kubernetes RBAC static analysis & visualisation tool☆735Updated last month
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆401Updated 4 years ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆230Updated 2 months ago
- Response Engine for managing threats in your Kubernetes☆186Updated last month
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 9 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆192Updated last year
- Take automated actions against threats and vulnerabilities.☆215Updated 2 years ago
- ☆123Updated 6 months ago
- ☆59Updated this week
- a tool to audit the istio service mesh☆173Updated 4 years ago
- Kubernetes Common Configuration Scoring System☆122Updated 3 years ago
- 💰💸☁️ For those interested in running Kubernetes in highly regulated environments, particularly financial services☆311Updated 3 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆335Updated 7 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year