kube-security / orcaLinks
This repository contains the container image scanning tool ORCA
☆40Updated 2 months ago
Alternatives and similar repositories for orca
Users that are interested in orca are comparing it to the libraries listed below
Sorting:
- Outil de sécurité des architectures kubernetes avancées☆54Updated last month
- 🧰 Multi Tool Kubernetes Pentest Image☆243Updated 3 months ago
- Validate the isolation posture of your container environment.☆296Updated this week
- ☆81Updated last month
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆164Updated last week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆107Updated 7 months ago
- Response Engine for managing threats in your Kubernetes☆168Updated this week
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotat…☆45Updated 2 weeks ago
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆442Updated 2 weeks ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆462Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆116Updated 2 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated this week
- BadRobot - Operator Security Audit Tool☆221Updated 2 weeks ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆71Updated 3 months ago
- Inspect certificate authorities in container images☆236Updated last week
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 9 months ago
- Kubernetes audit logging, when you don't control the control plane☆84Updated this week
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- The security workflow engine!☆119Updated this week
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆51Updated 3 weeks ago
- A collection of tools to improve your containerized apps security posture☆144Updated last year
- A tool for preventing the installation of malicious npm and PyPI packages☆153Updated this week
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- KBOM - Kubernetes Bill of Materials☆318Updated last week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated last year
- Run Falco in a GitHub Actions to detect suspicious behavior in your CI/CD☆40Updated 2 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆83Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 11 months ago