redhuntlabs / KubeStalkLinks
KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.
β172Updated 7 months ago
Alternatives and similar repositories for KubeStalk
Users that are interested in KubeStalk are comparing it to the libraries listed below
Sorting:
- π§° Multi Tool Kubernetes Pentest Imageβ246Updated 2 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.β109Updated 8 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.β189Updated this week
- OWASP Kubernetes security and compliance tool [WIP]β106Updated 2 years ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.β47Updated last year
- β180Updated 4 months ago
- Curating Falco rules with MITRE ATT&CK Matrixβ84Updated last year
- β102Updated 7 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testingβ465Updated last year
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β479Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.β160Updated last year
- Kubernetes Stranger Dangerβ65Updated this week
- Tool for auditing RBACs in Kubernetesβ223Updated last year
- Find secrets in git repositories with TruffleHog & Gitleaksβ52Updated this week
- a tool to audit the istio service meshβ173Updated 3 years ago
- Awesome resources about Security in Kubernetesβ44Updated 2 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Contaβ¦β283Updated 2 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.β56Updated 2 weeks ago
- Protect against subdomain takeoverβ93Updated last month
- KBOM - Kubernetes Bill of Materialsβ319Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β56Updated 7 months ago
- β44Updated 4 months ago
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β119Updated 2 years ago
- Container π¦ Security π Best Practices Checklist π & Slidesβ69Updated 4 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β84Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ350Updated 5 months ago
- A collection of tools to improve your containerized apps security postureβ148Updated last year
- π Visualize and explore IaC βοΈ Create and share notes in VS Code π€ Sync notes and findings in real-time with friendsβ74Updated last year
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specificationβ68Updated last week
- Cloud agnostic IAM permissions enumeratorβ157Updated 5 months ago