☆275Mar 19, 2026Updated this week
Alternatives and similar repositories for kube_security_lab
Users that are interested in kube_security_lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Jan 4, 2026Updated 2 months ago
- ☆108Nov 15, 2025Updated 4 months ago
- Kubernetes Security Training Platform - focusing on security mitigation☆981Sep 2, 2024Updated last year
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Mar 21, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Peirates - Kubernetes Penetration Testing tool☆1,429Jan 20, 2026Updated 2 months ago
- Simple tool to send the json output from HTTPX to BBRF☆11Mar 30, 2023Updated 2 years ago
- ☆46May 12, 2025Updated 10 months ago
- Dockerfiles for security tools☆52Nov 7, 2024Updated last year
- A curated list for Awesome Kubernetes Security resources☆1,993Mar 18, 2026Updated last week
- Tool for auditing RBACs in Kubernetes☆224Feb 5, 2024Updated 2 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆758Oct 14, 2023Updated 2 years ago
- A tool to scan Kubernetes cluster for risky permissions☆1,418May 25, 2025Updated 10 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,447Nov 18, 2025Updated 4 months ago
- A collection of manifests that will create pods with elevated privileges.☆692Dec 30, 2025Updated 2 months ago
- Security risk analysis for Kubernetes resources☆1,446Feb 16, 2026Updated last month
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,218Feb 3, 2025Updated last year
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆100Nov 18, 2020Updated 5 years ago
- 🧰 Multi Tool Kubernetes Pentest Image☆255Mar 3, 2026Updated 3 weeks ago
- A container analysis and exploitation tool for pentesters and engineers.☆677Sep 27, 2023Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,283Mar 12, 2026Updated last week
- Container introspection tool. Find out what container runtime is being used as well as features available.☆1,075Dec 9, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Demos for several kubernetes security features☆64Jan 9, 2025Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆407Sep 2, 2023Updated 2 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆478Nov 7, 2025Updated 4 months ago
- Kubernetes security tool for policy enforcement☆441Jan 12, 2023Updated 3 years ago
- A web-based dashboard for importing and viewing nmap scan results☆15May 1, 2023Updated 2 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆213Aug 18, 2021Updated 4 years ago
- ☆30May 12, 2025Updated 10 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆114Jan 27, 2020Updated 6 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,372Feb 3, 2026Updated last month
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,260Dec 8, 2025Updated 3 months ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated last year
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Jul 20, 2022Updated 3 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago
- ☆27Feb 19, 2026Updated last month
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆553Mar 12, 2026Updated last week