mhausenblas / k8s-sec
Kubernetes Security: from Image Hygiene to Network Policies
☆143Updated 6 years ago
Alternatives and similar repositories for k8s-sec:
Users that are interested in k8s-sec are comparing it to the libraries listed below
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 4 years ago
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installations☆265Updated last year
- Test utility for cve-2018-1002105☆195Updated 6 years ago
- A security monitoring solution for Kubernetes☆132Updated last year
- ☆214Updated 8 years ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆176Updated last year
- Help building an adaptive and fine-grained pod security policy☆331Updated last year
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆77Updated 5 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 4 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆103Updated 5 years ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Network security testing for Kubernetes DevSecOps workflows☆375Updated 8 months ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- PoC for CVE-2018-1002105.☆223Updated 6 years ago
- Tool for auditing RBACs in Kubernetes☆219Updated last year
- Dynamic Application and API Security Testing☆192Updated 2 years ago
- Kubernetes Easter CTF☆58Updated 4 years ago
- Kubernetes security tool for policy enforcement☆443Updated 2 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆301Updated 9 months ago
- Kubernetes Common Configuration Scoring System☆124Updated 2 years ago
- ☆55Updated 7 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- ☆49Updated 4 years ago
- Security risk analysis for Kubernetes resources☆74Updated 3 months ago
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆199Updated 6 years ago
- Kubernetes operator for Falco that allows developers to manage rules for detecting intruders and backdoors☆68Updated 4 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- Security risk analysis for Kubernetes resources☆511Updated 3 months ago
- Run CoreOs Clair standalone☆253Updated 3 months ago