krisnova / hack
Kubernetes security and vulnerability tools and utilities.
☆56Updated 3 years ago
Alternatives and similar repositories for hack
Users that are interested in hack are comparing it to the libraries listed below
Sorting:
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆62Updated 3 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated last month
- ☆20Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- ☆29Updated 3 months ago
- ☆25Updated this week
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆37Updated 4 months ago
- An admission controller service and kubectl plugin to handle container drift in K8s clusters☆124Updated 3 years ago
- An application that regularly scans all containers in a Kubernetes cluster for vulnerabilities☆50Updated 2 years ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆66Updated 4 months ago
- Runtime security plug to protect user containers☆65Updated 2 weeks ago
- Tool to automate build instructions generation☆32Updated last week
- Collection of kbrew recipes☆10Updated 3 years ago
- A kubectl plugin to visualize network policies rules.☆96Updated last year
- ☆22Updated last year
- Evolution process of The Falco Project☆52Updated this week
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- ☆35Updated 3 years ago
- Kubernetes audit logging, when you don't control the control plane☆77Updated last week
- A collection of Docker and Kubernetes resources☆18Updated 2 years ago
- Kubernetes Admission Controller for Image Scanning using OPA☆50Updated last year
- Creates PolicyReports based on the different Trivy Operator CRDs like VulnerabilityReports☆60Updated this week
- An example of a kubernetes cluster appropriate for a startup company☆60Updated 2 years ago
- RBAC in Kubernetes visualizer☆24Updated 5 years ago
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 4 years ago
- Generate K8s RBAC policies based on e2e test runs☆28Updated 3 years ago
- Service implementation for a Kubernetes Dynamic Webhook controller for interacting with Anchore☆64Updated last week
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆23Updated 5 months ago