raesene / container_sec_workstationLinks
☆34Updated 2 months ago
Alternatives and similar repositories for container_sec_workstation
Users that are interested in container_sec_workstation are comparing it to the libraries listed below
Sorting:
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- ☆51Updated 5 years ago
- a tool to audit the istio service mesh☆173Updated 4 years ago
- ☆264Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- Kubernetes Easter CTF☆59Updated 5 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆209Updated 4 years ago
- OWASP Kubernetes Security Testing Guide☆38Updated last week
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated last month
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆105Updated 6 years ago
- ☆27Updated 3 weeks ago
- ☆44Updated 5 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- Tool for auditing RBACs in Kubernetes☆225Updated last year
- Security scanning & static analysis tool☆94Updated last year
- ☆102Updated 8 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated 3 weeks ago
- Protect against subdomain takeover☆94Updated 3 months ago
- Kubernetes security and vulnerability tools and utilities.☆57Updated 4 years ago
- ☆115Updated 2 months ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆103Updated 6 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆284Updated 2 years ago
- ☆56Updated last month
- Kubernetes Pwnage for all☆56Updated 4 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A repository to store Rad Fingerprinting data.☆24Updated last year
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Labs for Threat Modelling training delivered by ControlPlane☆34Updated last year