kube-security / orcaLinks
This repository contains the container image scanning tool ORCA
☆42Updated 4 months ago
Alternatives and similar repositories for orca
Users that are interested in orca are comparing it to the libraries listed below
Sorting:
- Outil de sécurité des architectures kubernetes avancées☆72Updated 2 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆252Updated 5 months ago
- ☆86Updated 3 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Validate the isolation posture of your container environment.☆310Updated last month
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆195Updated 4 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Response Engine for managing threats in your Kubernetes☆189Updated 2 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆114Updated this week
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated 4 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆74Updated 9 months ago
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆449Updated 2 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Updated last year
- ☆185Updated 9 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆475Updated 2 months ago
- ☆16Updated last year
- Software Bill of Behaviour: A vendor-supplied profile of runtime behaviors for software, designed to be distributed directly within OCI a…☆45Updated 2 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆36Updated 3 months ago
- Kubernetes audit logging, when you don't control the control plane☆90Updated this week
- Inspect certificate authorities in container images☆240Updated last month
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆176Updated last year
- ☆104Updated 2 months ago
- Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotat…☆84Updated 3 weeks ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆60Updated last year
- The security workflow engine!☆136Updated 2 months ago
- ☆42Updated 2 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago