krol3 / kubernetes-security-checklistLinks
Awesome resources about Security in Kubernetes
☆42Updated 2 years ago
Alternatives and similar repositories for kubernetes-security-checklist
Users that are interested in kubernetes-security-checklist are comparing it to the libraries listed below
Sorting:
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 11 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last week
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆105Updated 6 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated last year
- OWASP Kubernetes Security Testing Guide☆38Updated 9 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- ☆248Updated 8 months ago
- A deliberately vulnerable Kubernetes cluster☆125Updated last year
- OWASP Foundation Web Respository☆44Updated 9 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated this week
- OWASP Foundation Web Respository☆35Updated 8 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 5 months ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆158Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated last year
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 4 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- WAF bypass PoC☆47Updated last year
- Dependency Combobulator☆93Updated last year
- ☆178Updated last month
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆181Updated 11 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆108Updated 6 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆59Updated 4 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- ☆45Updated 3 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year