mrtc0 / cxrayLinks
Tracing security events in container with BPF
☆15Updated last year
Alternatives and similar repositories for cxray
Users that are interested in cxray are comparing it to the libraries listed below
Sorting:
- Kubernetes CTF☆43Updated 4 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- ☆41Updated last month
- The Dirty Pipe Vulnerability☆46Updated 3 years ago
- Kilt is a project that defines how to inject foreign apps into containers☆13Updated last year
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- ptrace-based event producer for udig☆67Updated 2 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 5 years ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆37Updated 8 months ago
- lightweight CVE search☆21Updated 2 years ago
- A repository to store Rad Fingerprinting data.☆24Updated 10 months ago
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆23Updated last year
- ☆29Updated 4 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 6 months ago
- Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.☆23Updated last year
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Save temporary security credentials of AWS via Azure AD SSO☆25Updated 10 months ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- eBPF Library for Go☆29Updated last month
- Sysdig labs☆13Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated this week
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆14Updated 4 years ago
- trivy-db-to is a tool for migrating/converting vulnerability information from Trivy DB to other datasource.☆27Updated 7 months ago
- Trivy based vulnerability management service☆55Updated 3 months ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- OpenCSPM Community Controls☆14Updated 4 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 5 years ago
- Inject Falco and pdig into a running kubernetes pod☆13Updated 5 years ago