kube-security / orcaLinks
This repository contains the container image scanning tool ORCA
☆42Updated 2 months ago
Alternatives and similar repositories for orca
Users that are interested in orca are comparing it to the libraries listed below
Sorting:
- Outil de sécurité des architectures kubernetes avancées☆56Updated 4 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆245Updated 2 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 10 months ago
- ☆84Updated last week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆190Updated last month
- Validate the isolation posture of your container environment.☆303Updated 2 months ago
- Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotat…☆76Updated 2 weeks ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆113Updated 3 weeks ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆120Updated last month
- Pentester-focused Docker registry tool to enumerate and pull images☆37Updated 3 weeks ago
- ☆182Updated 6 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆171Updated last week
- Kubernetes focused container assessment and context discovery tool for penetration testing☆467Updated last year
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆447Updated 3 weeks ago
- Response Engine for managing threats in your Kubernetes☆180Updated this week
- ☆16Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- The security workflow engine!☆129Updated 3 weeks ago
- K8s API Honeypot with Active Defense Capabilities☆42Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆59Updated 9 months ago
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated 7 months ago
- ☆103Updated 9 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆73Updated 6 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆87Updated last year
- Kubernetes audit logging, when you don't control the control plane☆88Updated this week