r0binak / MTKPILinks
🧰 Multi Tool Kubernetes Pentest Image
☆251Updated 4 months ago
Alternatives and similar repositories for MTKPI
Users that are interested in MTKPI are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆195Updated 4 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆176Updated 11 months ago
- ☆185Updated 8 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆110Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testing☆473Updated 2 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆86Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆312Updated 3 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- ☆86Updated last week
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆120Updated 2 years ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆402Updated 2 years ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆483Updated 4 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆352Updated 9 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- ☆47Updated 4 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆59Updated 11 months ago
- This repository contains the container image scanning tool ORCA☆42Updated 4 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated 3 months ago
- Outil de sécurité des architectures kubernetes avancées☆66Updated last month
- Tool for building Kubernetes attack paths☆931Updated last month
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆292Updated last year
- OWASP Kubernetes security and compliance tool [WIP]☆108Updated 2 years ago
- Validate the isolation posture of your container environment.☆311Updated 3 weeks ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆369Updated 5 months ago
- ☆191Updated 9 months ago
- A collection of manifests that will create pods with elevated privileges.☆669Updated 2 weeks ago
- ☆103Updated 2 months ago