nmeisenzahl / hijack-kubernetes
This repo includes a demo that shows how a Kubernetes cluster can be hijacked and how to prevent it using common best practices.
☆46Updated last year
Related projects ⓘ
Alternatives and complementary repositories for hijack-kubernetes
- Kubernetes Operator based on the open-source container vulnerability scanner Trivy.☆47Updated 4 months ago
- A GitOps Connector integrates a GitOps operator with CI/CD orchestrator☆126Updated 3 months ago
- A standalone exporter for vulnerability reports and other CRs created by Trivy Operator (formerly Starboard).☆58Updated this week
- Creates PolicyReports based on the different Trivy Operator CRDs like VulnerabilityReports☆56Updated last week
- A Kubernetes operator creating K8s resources by annotating namespaces☆50Updated 3 years ago
- A pane of glass between you and your Kubernetes clusters.☆45Updated 10 months ago
- The Helm Charts OCI Proxy, will proxy and transform Helm Chart into OCI images on the fly. Address any Helm Chart as OCI image.☆97Updated 2 months ago
- Azure Provider for Crossplane.☆63Updated this week
- Safe and Controlled GitOps Promotion Across Environments/Failure-Domains☆64Updated this week
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆194Updated last week
- 🤖 Discover how to apply your LLM app skills on Kubernetes!☆141Updated 8 months ago
- THIS PROJECT IS NO LONGER MAINTAINED AND IS ARCHIVED. cluster-api-state-metrics (CASM) is a service that listens to the Kubernetes API se…☆60Updated 2 years ago
- This Kubernetes fork is intended to provide long term support for Kubernetes releases, but is not an official release of the Kubernetes …☆15Updated last week
- https://github.com/aquasecurity/trivy-operator☆37Updated 2 years ago
- Plugins to support Velero on Microsoft Azure☆101Updated 2 weeks ago
- Policy Reporter UI☆31Updated this week
- Kubernetes Operator to sync secrets between different secret backends and Kubernetes