kondukto-io / kntrlLinks
kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this by monitoring kernel calls, and denying access as soon as your defined behaviour is detected. For more: https://kntrl.dev
☆123Updated 2 months ago
Alternatives and similar repositories for kntrl
Users that are interested in kntrl are comparing it to the libraries listed below
Sorting:
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆114Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 11 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Runtime Security Solution for your CI/CD Pipeline☆111Updated 2 weeks ago
- The security workflow engine!☆134Updated 2 weeks ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆206Updated this week
- ☆74Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆60Updated 10 months ago
- ☆85Updated last month
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- A full insecure kubernetes application for testing security tools☆90Updated last month
- ☆114Updated 3 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- ☆182Updated 7 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- ☆57Updated last week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 8 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Updated last week
- Documenting your Threat Models with HCL☆438Updated 2 weeks ago
- boostsecurityio/poutine☆347Updated last week
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆190Updated 2 months ago
- AWS honey token manager☆89Updated last year
- ☆22Updated 4 months ago
- ☆193Updated 7 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated last month
- Compares and analyzes GCP IAM roles.☆77Updated 8 months ago