☆107Nov 15, 2025Updated 3 months ago
Alternatives and similar repositories for container-security-site
Users that are interested in container-security-site are comparing it to the libraries listed below
Sorting:
- ☆270Jan 14, 2026Updated last month
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- a prompt injection scanner for custom LLM applications☆21Feb 16, 2025Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- Cloud Native Security News☆67Dec 27, 2024Updated last year
- docker image with useful network and container tools and SSH☆68Nov 25, 2024Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testing☆475Nov 7, 2025Updated 3 months ago
- Demos for several kubernetes security features☆64Jan 9, 2025Updated last year
- ☆46May 12, 2025Updated 9 months ago
- ☆35Jan 4, 2026Updated 2 months ago
- Collection of incidents resulting from caching issues☆29Jun 3, 2025Updated 9 months ago
- ☆22Jul 24, 2025Updated 7 months ago
- ☆23Feb 20, 2023Updated 3 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Aug 30, 2019Updated 6 years ago
- A full insecure kubernetes application for testing security tools☆93Oct 23, 2025Updated 4 months ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Jun 11, 2020Updated 5 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,425Jan 20, 2026Updated last month
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Updated this week
- K8 Deep dive - Core Concepts, CRDs, Operators, Controllers, Openshift, kubebuilder, Coreos operator framework☆10May 1, 2023Updated 2 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- OSCAL and Kyverno Policy Demo for AWS☆16Aug 16, 2023Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Sep 26, 2023Updated 2 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Apr 28, 2020Updated 5 years ago
- ☆30Jan 12, 2023Updated 3 years ago
- Adversary Emulation Planner☆42Jan 9, 2026Updated last month
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Dec 15, 2025Updated 2 months ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094☆14Apr 6, 2024Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- Container Security Workshop covering using Falco on Kubernetes.☆106Apr 30, 2021Updated 4 years ago