Kubernetes Stranger Danger
☆68Jan 9, 2026Updated 2 months ago
Alternatives and similar repositories for kubernetes-goof
Users that are interested in kubernetes-goof are comparing it to the libraries listed below
Sorting:
- Kubernetes Kubelet Image Credential Provider for Hashicorp Vault☆22Updated this week
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Dec 15, 2025Updated 2 months ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 2 months ago
- ☆12Dec 21, 2021Updated 4 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆54Aug 12, 2025Updated 6 months ago
- Quickly open links from from kubernetes resources using jsonpath templates.☆13Feb 26, 2026Updated last week
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 7 months ago
- Examples of various Entra ID scenarios in Terraform☆17Sep 24, 2024Updated last year
- ☆46May 12, 2025Updated 9 months ago
- K8s-Secret-Expiry-Controller is a Kubernetes operator that manages and tracks the lifespan of Kubernetes secrets.☆15Jun 20, 2023Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆198Feb 10, 2026Updated 3 weeks ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 11 months ago
- ☆14Apr 21, 2021Updated 4 years ago
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆19Jul 2, 2025Updated 8 months ago
- ☆272Updated this week
- Kubernetes (k8s) admission controller webhook based on Casbin☆34Aug 8, 2023Updated 2 years ago
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆18Jan 30, 2025Updated last year
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆131Feb 12, 2026Updated 3 weeks ago
- A full insecure kubernetes application for testing security tools☆93Oct 23, 2025Updated 4 months ago
- ☆21Apr 16, 2025Updated 10 months ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆370Mar 1, 2026Updated last week
- A command-line tool to perform Local Health Check Probes inside Container Images (ECS, Docker)☆54Feb 11, 2026Updated 3 weeks ago
- An AI-powered, user-friendly Kubernetes UI with an intuitive interface for easy cluster management.☆33Updated this week
- Deployment scripts for mafia card shuffle - https://mafia.brolia.com☆22Oct 17, 2022Updated 3 years ago
- A CLI utility for your Kubernetes nodes☆29Updated this week
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- ☆52Dec 13, 2025Updated 2 months ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆76Updated this week
- Docker's containerized github-actions runner☆26Oct 1, 2023Updated 2 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Dec 2, 2025Updated 3 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆255Updated this week
- ☆43Aug 27, 2025Updated 6 months ago
- A Python script to generate a Kubernetes restarting pods report☆26Apr 26, 2025Updated 10 months ago
- Intent driven security automation framework☆27Aug 12, 2025Updated 6 months ago
- Exploit for CVE-2021-25741 vulnerability☆28Jan 19, 2022Updated 4 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,425Jan 20, 2026Updated last month
- Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco☆63Jun 2, 2021Updated 4 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Sep 12, 2023Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆33Nov 12, 2025Updated 3 months ago