r0binak / MTKPI
π§° Multi Tool Kubernetes Pentest Image
β229Updated this week
Alternatives and similar repositories for MTKPI:
Users that are interested in MTKPI are comparing it to the libraries listed below
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.β138Updated 2 weeks ago
- β176Updated 4 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.β171Updated 2 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knβ¦β54Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testingβ453Updated 10 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β46Updated 10 months ago
- β70Updated 2 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β81Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β82Updated 3 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"β67Updated last year
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β116Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β277Updated 2 months ago
- Curating Falco rules with MITRE ATT&CK Matrixβ78Updated last year
- BadRobot - Operator Security Audit Toolβ219Updated this week
- Response Engine for managing threats in your Kubernetesβ154Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.β376Updated last year
- Tool for building Kubernetes attack pathsβ846Updated 2 weeks ago
- β44Updated 3 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ343Updated 3 weeks ago
- Secrets scanner that understands codeβ189Updated last year
- Protect against subdomain takeoverβ93Updated 10 months ago
- Kubernetes audit logging, when you don't control the control planeβ73Updated last week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β53Updated 2 months ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.β161Updated last year
- Kubernetes exploitation toolβ359Updated 8 months ago
- A collection of manifests that will create pods with elevated privileges.β618Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ139Updated 3 months ago
- Validate the isolation posture of your container environment.β269Updated this week
- OWASP Kubernetes security and compliance tool [WIP]β106Updated last year
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko geneβ¦β104Updated 11 months ago