A full insecure kubernetes application for testing security tools
☆95Mar 28, 2026Updated last month
Alternatives and similar repositories for insecure-kubernetes-deployments
Users that are interested in insecure-kubernetes-deployments are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆175Apr 23, 2025Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- ☆12Mar 31, 2021Updated 5 years ago
- ☆26Apr 12, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ☆11Jan 24, 2023Updated 3 years ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆30Nov 26, 2025Updated 5 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 3 months ago
- ☆112Mar 29, 2026Updated last month
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Cloud deployment size calculation utilities☆24Updated this week
- Securade.ai Sentinel - A monitoring and surveillance application that enables visual Q&A and video captioning for existing CCTV cameras.☆29Apr 6, 2025Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Updated this week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- ☆41Aug 25, 2024Updated last year
- OWASP Foundation Web Respository☆10May 1, 2026Updated last week
- ☆16May 15, 2024Updated last year
- ☆21Jul 25, 2025Updated 9 months ago
- Public repository of all things cloud security.☆47Sep 20, 2024Updated last year
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆501Jun 27, 2025Updated 10 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Unauthenticated enumeration of AWS IAM Roles.☆26Apr 18, 2026Updated 3 weeks ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated 3 months ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆46Apr 30, 2026Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated last week
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated last year
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Nov 22, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆613Mar 24, 2026Updated last month
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Privateer is a plugin-based framework for security & compliance evaluations.☆21May 1, 2026Updated last week
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆23Mar 18, 2025Updated last year
- ☆11Sep 21, 2021Updated 4 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆55Apr 1, 2026Updated last month
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Sep 26, 2023Updated 2 years ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- Efficient DevSecOps☆47Jun 30, 2025Updated 10 months ago