mrtc0 / cxray
Tracing security events in container with BPF
☆15Updated last year
Alternatives and similar repositories for cxray:
Users that are interested in cxray are comparing it to the libraries listed below
- Kubernetes CTF☆43Updated 4 years ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆37Updated 6 months ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- Kilt is a project that defines how to inject foreign apps into containers☆13Updated last year
- The Dirty Pipe Vulnerability☆47Updated 3 years ago
- Trivy based vulnerability management service☆55Updated last month
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11Updated 4 years ago
- RPM DB bindings for go☆62Updated 4 months ago
- ☆25Updated 11 months ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 4 years ago
- egrets monitors egress☆45Updated 5 years ago
- lightweight CVE search☆21Updated 2 years ago
- OpenCSPM Community Controls☆14Updated 3 years ago
- ptrace-based event producer for udig☆67Updated 2 years ago
- A lightweight CLI tool that finds system calls being called inside golang applications.☆31Updated 3 years ago
- Tools for kubernetes pod network tapping☆42Updated 5 years ago
- Inject Falco and pdig into a running kubernetes pod☆13Updated 4 years ago
- Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.☆22Updated 10 months ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- Sysdig labs☆13Updated last year
- Save temporary security credentials of AWS via Azure AD SSO☆25Updated 8 months ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- CVEs <--> Metasploit-Framework modules☆24Updated last week
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 4 months ago
- Apache OpenWhisk on Knative☆24Updated 6 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆77Updated 5 years ago
- SysFlow documentation and issues tracker☆46Updated 6 months ago
- trivy-db-to is a tool for migrating/converting vulnerability information from Trivy DB to other datasource.☆27Updated 5 months ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago