lightspin-tech / red-kube
Red Team K8S Adversary Emulation Based on kubectl
☆817Updated 3 years ago
Alternatives and similar repositories for red-kube:
Users that are interested in red-kube are comparing it to the libraries listed below
- A tool to scan Kubernetes cluster for risky permissions☆1,363Updated 3 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,157Updated last month
- A Blazing fast Security Auditing tool for Kubernetes☆996Updated 11 months ago
- A container analysis and exploitation tool for pentesters and engineers.☆663Updated last year
- Peirates - Kubernetes Penetration Testing tool☆1,288Updated this week
- Kubernetes Security Training Platform - focusing on security mitigation☆943Updated 6 months ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆268Updated last year
- Kubernetes security notes and best practices☆717Updated 2 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆619Updated 5 years ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆885Updated 3 months ago
- WeirdAAL (AWS Attack Library)☆797Updated 2 months ago
- ☆426Updated 4 years ago
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆937Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,957Updated this week
- A curated list of awesome Kubernetes security resources☆915Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆686Updated last year
- Tool for auditing RBACs in Kubernetes☆215Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆557Updated 3 months ago
- kube-scan: Octarine k8s cluster risk assessment tool☆802Updated 2 years ago
- A client for kubelet☆773Updated 2 months ago
- all paths lead to clouds☆638Updated last year
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,363Updated last week
- A collection of manifests that will create pods with elevated privileges.☆613Updated 2 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆916Updated this week
- Overlord - Red Teaming Infrastructure Automation☆616Updated 9 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆907Updated 5 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆343Updated last year
- Security risk analysis for Kubernetes resources☆1,292Updated this week
- ☆239Updated 6 months ago
- ☆559Updated 3 years ago