latiotech / insecure-kubernetes-deploymentsView external linksLinks
A full insecure kubernetes application for testing security tools
☆90Oct 23, 2025Updated 3 months ago
Alternatives and similar repositories for insecure-kubernetes-deployments
Users that are interested in insecure-kubernetes-deployments are comparing it to the libraries listed below
Sorting:
- ☆12Mar 31, 2021Updated 4 years ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆176Apr 23, 2025Updated 9 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 weeks ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- ☆22Jul 24, 2025Updated 6 months ago
- ☆107Nov 15, 2025Updated 2 months ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆43Jan 6, 2026Updated last month
- List your tfsec issues in the QuickFix window with this plugin.☆12May 16, 2022Updated 3 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 8 months ago
- ☆11Jan 24, 2023Updated 3 years ago
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Sep 26, 2023Updated 2 years ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Nov 26, 2025Updated 2 months ago
- Public repository of all things cloud security.☆47Sep 20, 2024Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated last month
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- ☆12Dec 21, 2021Updated 4 years ago
- Privateer is a plugin-based framework to validate the status of deployed resources.☆17Feb 5, 2026Updated last week
- ☆12Apr 14, 2020Updated 5 years ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Feb 4, 2026Updated last week
- ☆48Dec 20, 2025Updated last month
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆494Jun 27, 2025Updated 7 months ago
- CLI tool to generate terraform files from existing ZPA and ZIA☆23Updated this week
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- ☆16May 15, 2024Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last week
- Kubernetes Stranger Danger☆68Jan 9, 2026Updated last month
- OWASP Foundation Web Respository☆601Nov 24, 2025Updated 2 months ago
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated last year
- Cloud deployment size calculation utilities☆23Dec 1, 2025Updated 2 months ago
- Kubernetes Kubelet Image Credential Provider for Hashicorp Vault☆22Jan 15, 2026Updated 3 weeks ago
- Audit your GitHub Actions workflow runs to see exactly which Actions were downloaded☆80Jan 26, 2026Updated 2 weeks ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 weeks ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆32Feb 2, 2026Updated last week
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago