r0binak / MTKPILinks
π§° Multi Tool Kubernetes Pentest Image
β240Updated 2 months ago
Alternatives and similar repositories for MTKPI
Users that are interested in MTKPI are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.β141Updated 3 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.β171Updated 5 months ago
- β179Updated 2 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β105Updated 6 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testingβ461Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β82Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and knβ¦β54Updated last year
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β47Updated last year
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β119Updated last year
- Curating Falco rules with MITRE ATT&CK Matrixβ82Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ346Updated 3 months ago
- β79Updated this week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"β67Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.β385Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β284Updated 5 months ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β476Updated 3 years ago
- β99Updated 5 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β55Updated 5 months ago
- β46Updated 3 years ago
- Tool for building Kubernetes attack pathsβ890Updated 2 weeks ago
- Response Engine for managing threats in your Kubernetesβ165Updated this week
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.β351Updated 2 months ago
- Tool for auditing RBACs in Kubernetesβ221Updated last year
- OWASP Kubernetes security and compliance tool [WIP]β106Updated 2 years ago
- A collection of manifests that will create pods with elevated privileges.β639Updated 3 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSβ40Updated 10 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.β285Updated 10 months ago
- KBOM - Kubernetes Bill of Materialsβ317Updated 3 months ago
- Validate the isolation posture of your container environment.β291Updated last week
- A tool for preventing the installation of malicious npm and PyPI packagesβ150Updated this week