krol3 / kubernetes-security-checklist
Awesome resources about Security in Kubernetes
☆42Updated 2 years ago
Alternatives and similar repositories for kubernetes-security-checklist:
Users that are interested in kubernetes-security-checklist are comparing it to the libraries listed below
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated last year
- OWASP Foundation Web Respository☆34Updated 7 months ago
- ☆176Updated 4 months ago
- OWASP Kubernetes Security Testing Guide☆37Updated 7 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆103Updated 4 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated last month
- Curated list of security tools☆64Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆179Updated 9 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 10 months ago
- ☆44Updated 3 years ago
- OWASP Foundation Web Respository☆44Updated 7 months ago
- A full insecure kubernetes application for testing security tools☆70Updated 2 weeks ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆105Updated 5 months ago
- Protect against subdomain takeover☆93Updated 10 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆123Updated 2 years ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆138Updated 2 weeks ago
- A project to visualize the software supply chain☆45Updated last year
- Kubernetes Security Testing Guide☆26Updated 11 months ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆78Updated last year
- Kubernetes Pwnage for all☆57Updated 4 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- WAF bypass PoC☆47Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆92Updated 2 months ago