A full insecure kubernetes application for testing security tools
☆93Oct 23, 2025Updated 4 months ago
Alternatives and similar repositories for insecure-kubernetes-deployments
Users that are interested in insecure-kubernetes-deployments are comparing it to the libraries listed below
Sorting:
- ☆12Mar 31, 2021Updated 4 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆176Apr 23, 2025Updated 10 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- ☆22Jul 24, 2025Updated 7 months ago
- ☆107Nov 15, 2025Updated 3 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated 3 weeks ago
- List your tfsec issues in the QuickFix window with this plugin.☆12May 16, 2022Updated 3 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Mar 2, 2026Updated last week
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Sep 26, 2023Updated 2 years ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 3 months ago
- Public repository of all things cloud security.☆47Sep 20, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Privateer is a plugin-based framework for security & compliance evaluations.☆18Mar 2, 2026Updated last week
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 2 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- ☆12Dec 21, 2021Updated 4 years ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 3 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 4 months ago
- ☆12Apr 14, 2020Updated 5 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 7 months ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- OWASP Foundation Web Respository☆601Updated this week
- Kubernetes Pwnage for all☆57Nov 14, 2020Updated 5 years ago
- ☆35Jan 4, 2026Updated 2 months ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆495Jun 27, 2025Updated 8 months ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last month
- Kubernetes Stranger Danger☆68Jan 9, 2026Updated 2 months ago
- Audit your GitHub Actions workflow runs to see exactly which Actions were downloaded☆80Mar 2, 2026Updated last week
- Kubernetes Kubelet Image Credential Provider for Hashicorp Vault☆22Updated this week
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- Externalize Java application access to protected resources as log messages.☆43Jan 22, 2026Updated last month