kondukto-io / kntrlLinks
kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this by monitoring kernel calls, and denying access as soon as your defined behaviour is detected. For more: https://kntrl.dev
☆116Updated 2 months ago
Alternatives and similar repositories for kntrl
Users that are interested in kntrl are comparing it to the libraries listed below
Sorting:
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated 2 weeks ago
- The security workflow engine!☆119Updated this week
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- A tool for preventing the installation of malicious npm and PyPI packages☆153Updated this week
- Runtime Security Solution for your CI/CD Pipeline☆108Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆107Updated 7 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 11 months ago
- ☆81Updated 3 weeks ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆58Updated last year
- ☆70Updated last week
- ☆179Updated 3 months ago
- ☆113Updated last week
- A full insecure kubernetes application for testing security tools☆89Updated 3 months ago
- ☆55Updated 2 weeks ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 6 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- boostsecurityio/poutine☆308Updated this week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆150Updated this week
- AWS honey token manager☆87Updated last year
- ☆79Updated 6 months ago
- Validate the isolation posture of your container environment.☆296Updated this week
- ☆187Updated 3 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆41Updated 3 weeks ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 4 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆152Updated 8 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 4 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆83Updated last year