redhuntlabs / KubeStalkLinks
KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.
β171Updated 4 months ago
Alternatives and similar repositories for KubeStalk
Users that are interested in KubeStalk are comparing it to the libraries listed below
Sorting:
- π§° Multi Tool Kubernetes Pentest Imageβ232Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β95Updated 5 months ago
- β96Updated 3 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β47Updated last year
- Tool for auditing RBACs in Kubernetesβ219Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.β139Updated 2 months ago
- Curating Falco rules with MITRE ATT&CK Matrixβ80Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ345Updated 2 months ago
- a tool to audit the istio service meshβ173Updated 3 years ago
- OWASP Kubernetes security and compliance tool [WIP]β106Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.β80Updated last year
- β178Updated last month
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β475Updated 3 years ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"β67Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testingβ461Updated 11 months ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.β161Updated last year
- Kubernetes exploitation toolβ359Updated 10 months ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specificationβ66Updated 5 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β81Updated last year
- Protect against subdomain takeoverβ92Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.β56Updated last week
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β118Updated last year
- β45Updated 3 years ago
- π Visualize and explore IaC βοΈ Create and share notes in VS Code π€ Sync notes and findings in real-time with friendsβ73Updated last year
- Awesome resources about Security in Kubernetesβ42Updated 2 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β55Updated 4 months ago
- KBOM - Kubernetes Bill of Materialsβ315Updated 2 months ago
- BadRobot - Operator Security Audit Toolβ220Updated 2 weeks ago
- Cloud agnostic IAM permissions enumeratorβ149Updated last month
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Contaβ¦β278Updated 2 years ago