lightspin-tech / red-kube
Red Team K8S Adversary Emulation Based on kubectl
☆818Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for red-kube
- A Blazing fast Security Auditing tool for Kubernetes☆990Updated 7 months ago
- A tool to scan Kubernetes cluster for risky permissions☆1,323Updated 4 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,240Updated 3 weeks ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆262Updated last year
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,124Updated 3 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,817Updated this week
- ☆422Updated 3 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆626Updated last year
- A tool to hunt for credentials in github wild AKA git*hunt☆292Updated last year
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆588Updated 4 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆437Updated 4 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆336Updated 10 months ago
- ☆231Updated 2 months ago
- ☆555Updated 3 years ago
- A collection of manifests that will create pods with elevated privileges.☆593Updated 2 years ago
- Kubernetes security notes and best practices☆710Updated 2 years ago
- A curated list for Awesome Kubernetes Security resources☆1,915Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆656Updated last year
- Tool for auditing RBACs in Kubernetes☆215Updated 9 months ago
- Security risk analysis for Kubernetes resources☆1,232Updated this week
- Kubernetes Security Training Platform - focusing on security mitigation☆929Updated 2 months ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆872Updated last year
- A curated list of awesome Kubernetes security resources☆903Updated 10 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆485Updated 2 months ago
- Moved to https://github.com/aquasecurity/trivy-operator☆1,351Updated this week
- Finding exposed secrets and personal data in GitLab☆195Updated this week
- Threat matrix for CI/CD Pipeline☆739Updated 4 months ago