lobuhi / awrbacs
AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.
☆43Updated 8 months ago
Alternatives and similar repositories for awrbacs:
Users that are interested in awrbacs are comparing it to the libraries listed below
- 🧰 Multi Tool Kubernetes Pentest Image☆221Updated 5 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆79Updated last month
- K8s-Secret-Expiry-Controller is a Kubernetes operator that manages and tracks the lifespan of Kubernetes secrets.☆14Updated last year
- A replacement for "kubectl exec" that works over WebSocket connections.☆36Updated 10 months ago
- KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and files…☆34Updated 4 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 3 weeks ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆51Updated last year
- ☆60Updated 3 weeks ago
- A kubectl plugin to visualize network policies rules.☆94Updated 11 months ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆65Updated last month
- Kubernetes Operator to sync secrets between different secret backends and Kubernetes☆159Updated last month
- ☆15Updated 6 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- ☆20Updated 9 months ago
- A multi tenant and multi project RBAC model implementation in Kubernetes☆25Updated 4 years ago
- Response Engine for managing threats in your Kubernetes☆148Updated this week
- ☆42Updated last year
- Resources for Kubernetes network policies☆38Updated 2 years ago
- Explanation on what a CRI (Container Runtime Interface) is and how to write it from scratch.☆27Updated 5 months ago
- Kubernetes audit logging, when you don't control the control plane☆67Updated last week
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 5 months ago
- A command-line tool to perform Local Health Check Probes inside Container Images (ECS, Docker)☆49Updated this week
- OPA policies for securing Docker API☆10Updated last year
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆101Updated 4 months ago
- An Argo CD extension to enable visualization of Trivy generated vulnerability reports in Argo CD UI.☆75Updated 9 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆64Updated this week
- A kubernetes network load balancer implementation☆47Updated last year
- Outil de sécurité des architectures kubernetes avancées☆48Updated 3 months ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆36Updated last month