yasindce1998 / KubeDaggerLinks
Kubernetes offensive framework built in eBPF
☆39Updated 2 years ago
Alternatives and similar repositories for KubeDagger
Users that are interested in KubeDagger are comparing it to the libraries listed below
Sorting:
- ☆90Updated 2 months ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 4 years ago
- ☆44Updated 8 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Updated 2 years ago
- ☆86Updated 3 weeks ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- Use eBPF to inject chaos into local processes☆67Updated last year
- Exploit for CVE-2021-25741 vulnerability☆28Updated 4 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated 2 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆168Updated last year
- Linux Kernel Runtime Integrity with eBPF☆184Updated 2 years ago
- A repository to store Rad Fingerprinting data.☆24Updated last year
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- Elastic's eBPF☆73Updated last week
- ☆28Updated 8 months ago
- Leaky Vessels Dynamic Detector☆103Updated 9 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆69Updated 4 months ago
- This tool have the power to hide any PID/directory in the Linux kernel☆30Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 4 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 3 years ago
- ☆13Updated last year
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆163Updated 2 months ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆91Updated last year
- Simple root privilege escalation detection using eBPF 🐝☆35Updated 4 months ago
- Kubernetes Unhinged Shell 😎☆46Updated 3 years ago
- ☆31Updated 3 years ago
- ☆104Updated 2 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆74Updated 3 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Updated 6 years ago