rung / tutorial-gke-securityLinks
The tutorial of "Kubernetes Security for Microservices"
☆14Updated last year
Alternatives and similar repositories for tutorial-gke-security
Users that are interested in tutorial-gke-security are comparing it to the libraries listed below
Sorting:
- Trivy based vulnerability management service☆55Updated 2 months ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆44Updated 2 years ago
- Kubernetes CTF☆43Updated 4 years ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆48Updated 2 years ago
- RISKEN is a monitoring tool for visualizing security risks.☆21Updated this week
- GCP Secret Management Demo Tool☆13Updated 6 years ago
- A recon tool for GCP Service Account Keys that requires no permissions☆22Updated last month
- Kilt is a project that defines how to inject foreign apps into containers☆13Updated last year
- For training of "Exploitation Fundamentals"☆49Updated 4 years ago
- API client for crt.sh☆41Updated 4 years ago
- Generate Terraform HCL files from existng GKE resources☆26Updated 6 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆23Updated 3 weeks ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11Updated 5 years ago
- itacho to manage and operate envoy based service mesh.☆28Updated last year
- Tracing security events in container with BPF☆15Updated last year
- control-controls control controls of AWS Security Hub across all regions.☆10Updated last month
- Tools that shutdown GCP Instance on your schedule.☆32Updated 2 years ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆95Updated 9 months ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆20Updated last week
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆19Updated 6 years ago
- Validate "terraform plan" changes against a customizable ruleset☆29Updated 7 months ago
- An insecure container runtime implementation☆33Updated 6 years ago
- Automatically update IoC for lucky visitor scam☆26Updated last month
- The Dirty Pipe Vulnerability☆46Updated 3 years ago
- OpenCSPM Community Controls☆14Updated 4 years ago
- AWS Cloudtrail event alerting lambda function. Send alerts to Slack, Email, or SNS.☆20Updated 2 years ago
- 🗻CLI tool to jump to your browser directly☆48Updated 2 years ago
- Build URL of GCP Cloud Logging Logs Explorer☆16Updated 10 months ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- [PoC] A socket-based tracing system for discovering network service dependencies. (renamed from transtracer)☆56Updated 3 weeks ago