k8s audit repo
☆230Aug 7, 2019Updated 6 years ago
Alternatives and similar repositories for audit-kubernetes
Users that are interested in audit-kubernetes are comparing it to the libraries listed below
Sorting:
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- A library for detecting certain improper uses of the "Defer, Panic, and Recover" pattern in Go programs☆97Dec 28, 2019Updated 6 years ago
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆397Sep 16, 2021Updated 4 years ago
- threatspec - continuous threat modeling, through code☆383Dec 30, 2020Updated 5 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆981Sep 2, 2024Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Notify Slack about GitHub Releases.☆17Dec 6, 2018Updated 7 years ago
- Self service portal for Kubernetes. Automate provisioning and access of namespaces, authenticate users using Active Directory or LDAP.☆15Jan 31, 2023Updated 3 years ago
- Container introspection tool. Find out what container runtime is being used as well as features available.☆1,074Dec 9, 2020Updated 5 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- A set of vulnerable Golang programs☆179Jul 5, 2023Updated 2 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- A Pythonic framework for threat modeling☆1,113Updated this week
- RBAC in Kubernetes visualizer☆402Jan 4, 2021Updated 5 years ago
- Security risk analysis for Kubernetes resources☆517Jan 23, 2025Updated last year
- Kubernetes security notes and best practices☆729Apr 15, 2022Updated 3 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- PoC for CVE-2018-1002105.☆222Dec 21, 2018Updated 7 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆310Aug 9, 2024Updated last year
- Secret management abstraction library☆28Mar 28, 2016Updated 9 years ago
- Hunt for security weaknesses in Kubernetes clusters☆5,020Mar 19, 2024Updated 2 years ago
- A GitHub Action for using Conftest☆33Nov 29, 2021Updated 4 years ago
- A starter repo to donate to Kubernetes-sigs so the community can own and iterate on stories over time, with issue tracking, as we close o…☆12Aug 23, 2022Updated 3 years ago
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,976Mar 13, 2026Updated last week
- Sensu 2.0 Alpha Documentation and Examples☆10Mar 12, 2018Updated 8 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆213Aug 18, 2021Updated 4 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- Reading list of more resources to learn about Adversarial Attacks on AI Systems☆34Jun 24, 2025Updated 8 months ago
- Container Builder Interface for Kubernetes with support for several backends (Docker, BuildKit, Buildah, kaniko, img, Google Cloud Contai…☆242May 14, 2019Updated 6 years ago
- Kubernetes security tool for policy enforcement☆441Jan 12, 2023Updated 3 years ago
- ☆17May 29, 2018Updated 7 years ago
- Easily create authenticated data structures☆43Apr 11, 2023Updated 2 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆676Sep 27, 2023Updated 2 years ago
- app-netutil is a library that provides API methods for applications to get pod network information.☆20Feb 13, 2026Updated last month
- Lambda Extension for iamlive☆42May 17, 2021Updated 4 years ago
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Nov 8, 2023Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Mar 10, 2023Updated 3 years ago