kondukto-io / kntrlLinks
kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this by monitoring kernel calls, and denying access as soon as your defined behaviour is detected. For more: https://kntrl.dev
☆120Updated last month
Alternatives and similar repositories for kntrl
Users that are interested in kntrl are comparing it to the libraries listed below
Sorting:
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆112Updated 2 weeks ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆168Updated this week
- Runtime Security Solution for your CI/CD Pipeline☆110Updated 4 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 9 months ago
- ☆73Updated last week
- The security workflow engine!☆125Updated last week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- ☆56Updated last month
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- ☆84Updated this week
- ☆114Updated 2 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆58Updated 9 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 6 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆42Updated 2 years ago
- A full insecure kubernetes application for testing security tools☆89Updated this week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆34Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆87Updated last year
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- ☆103Updated 8 months ago
- boostsecurityio/poutine☆341Updated this week
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆189Updated last month
- ☆182Updated 6 months ago
- Scan GitHub Actions Workflow logs for IOCs☆15Updated 2 weeks ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated this week
- Documenting your Threat Models with HCL☆436Updated 2 weeks ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆43Updated 2 weeks ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 5 months ago