☆29May 12, 2025Updated 9 months ago
Alternatives and similar repositories for teisteanas
Users that are interested in teisteanas are comparing it to the libraries listed below
Sorting:
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆46May 12, 2025Updated 9 months ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- ☆26Aug 31, 2023Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- ☆72May 13, 2025Updated 9 months ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Feb 19, 2026Updated 2 weeks ago
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Jan 31, 2023Updated 3 years ago
- EKS NG AMI Updater is an open source project that can be used to update kubernetes node group images.☆28Updated this week
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆16Jul 17, 2024Updated last year
- ☆12Feb 28, 2026Updated last week
- A template repository to quickly scaffold a Kubewarden policy written with Go language☆12Updated this week
- Easily run Conftest, pull remote policies, surface the results, and obtain test metrics☆12Oct 2, 2025Updated 5 months ago
- Cedar for Kubernetes brings the power of Cedar to Kubernetes authorization and admission validation, showing how cluster administrators c…☆140Nov 20, 2025Updated 3 months ago
- ☆41Dec 12, 2022Updated 3 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆112Jan 2, 2025Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Kubernetes Cluster API support in the Azure CLI☆20Aug 13, 2024Updated last year
- Falco plugins registry☆114Updated this week
- The modern application server☆15Mar 27, 2023Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- ☆15Mar 9, 2023Updated 2 years ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆75Apr 14, 2025Updated 10 months ago
- ☆18Oct 18, 2019Updated 6 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- 🎊 Count resources by kind☆40Aug 2, 2022Updated 3 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- ☆20Feb 9, 2024Updated 2 years ago
- ☆19Sep 16, 2024Updated last year
- CLI tool to list kubernetes deprecated apiVersion in cluster or files☆18Jul 5, 2023Updated 2 years ago
- JSON query library, based on Rego☆18Apr 23, 2020Updated 5 years ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- https://www.openshift.com/learn/topics/gitops/☆23Jun 18, 2024Updated last year
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago