swagitda / linux-cloud-native-security-101Links
Resources to learn about Linux, containers, k8s, and related security stuff
☆40Updated 4 years ago
Alternatives and similar repositories for linux-cloud-native-security-101
Users that are interested in linux-cloud-native-security-101 are comparing it to the libraries listed below
Sorting:
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- ☆51Updated 5 years ago
- Awesome list of resources related to container security☆244Updated 10 months ago
- Security scanning & static analysis tool☆94Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆283Updated 2 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆209Updated 4 years ago
- ☆34Updated 2 months ago
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- Kubernetes Easter CTF☆59Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆204Updated 4 years ago
- OWASP Kubernetes Security Testing Guide☆38Updated last week
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆105Updated 6 years ago
- A production-friendly malware scanner for your AWS cloud☆199Updated 4 years ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆108Updated 10 months ago
- ☆102Updated 8 months ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- CloudSplaining on AWS Managed Policies☆44Updated last month
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Lab Material for the Two-Day Defending Modern DevOps Environments Course☆125Updated 5 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆15Updated 5 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- AWS docs, guides, and other tools☆75Updated 2 years ago
- ☆263Updated last year