mhausenblas / k8s-secLinks
Kubernetes Security: from Image Hygiene to Network Policies
☆144Updated 7 years ago
Alternatives and similar repositories for k8s-sec
Users that are interested in k8s-sec are comparing it to the libraries listed below
Sorting:
- Links and resources for the O'Reilly Kubernetes Security book☆100Updated 4 years ago
- A security monitoring solution for Kubernetes☆132Updated 2 years ago
- ☆215Updated 9 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Updated 6 years ago
- Test utility for cve-2018-1002105☆195Updated 6 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆103Updated 6 years ago
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installations☆266Updated 2 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated 2 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆98Updated 4 years ago
- Kubernetes security notes and best practices☆725Updated 3 years ago
- Network security testing for Kubernetes DevSecOps workflows☆379Updated 2 weeks ago
- Container Security Workshop covering using Falco on Kubernetes.☆106Updated 4 years ago
- k8s audit repo☆229Updated 6 years ago
- Dynamic Application and API Security Testing☆193Updated 2 years ago
- Help building an adaptive and fine-grained pod security policy☆330Updated 2 years ago
- PoC for CVE-2018-1002105.☆222Updated 6 years ago
- ☆51Updated 5 years ago
- 💰💸☁️ For those interested in running Kubernetes in highly regulated environments, particularly financial services☆308Updated 3 years ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆174Updated 2 months ago
- Kubernetes Common Configuration Scoring System☆122Updated 3 years ago
- Kubernetes Easter CTF☆59Updated 5 years ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆307Updated last year
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆209Updated 4 years ago
- A simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sources☆28Updated 5 years ago
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆200Updated 6 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 5 years ago
- ☆264Updated last year
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 6 years ago
- Run CoreOs Clair standalone☆252Updated 10 months ago