kondukto-io / kntrl
kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this by monitoring kernel calls, and denying access as soon as your defined behaviour is detected. For more: https://kntrl.dev
☆112Updated last week
Alternatives and similar repositories for kntrl
Users that are interested in kntrl are comparing it to the libraries listed below
Sorting:
- A tool for preventing the installation of malicious PyPI and npm packages☆143Updated last week
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆84Updated 4 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated this week
- Runtime Security Solution for your CI/CD Pipeline☆102Updated last month
- A full insecure kubernetes application for testing security tools☆86Updated 3 weeks ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆54Updated 3 months ago
- ☆177Updated 3 weeks ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆53Updated 10 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 8 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆27Updated this week
- ☆66Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Updated last month
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆79Updated last year
- ☆72Updated this week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- AWS honey token manager☆87Updated 9 months ago
- The security workflow engine!☆111Updated this week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- ☆182Updated last month
- ☆54Updated this week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆133Updated last year
- Kubernetes audit logging, when you don't control the control plane☆77Updated last week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆278Updated 3 months ago
- ☆64Updated 3 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆140Updated 4 months ago