Stars
A curated list of resources about detecting threats and defending Kubernetes systems.
Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernet…
The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Containers, Kubernetes Clusters, and Cloud Native workloads.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).
Vulnerable app with examples showing how to not use secrets
Checklist for container security - devsecops practices
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
OpenSSF Scorecard - Security health metrics for Open Source
This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations. The policies are developed in accordance with the CIS Kube…
A tool that helps you get security patches for Docker images into production as quickly as possible without breaking things
Security configuration checks for popular cloud native applications and infrastructure.
A curated list of OPA related tools, frameworks and articles
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
A curated list of Falco related tools, frameworks, blogs, podcasts, and articles
dependency-check / Dependency-Check_Action
Forked from Santandersecurityresearch/DependencyCheck_ActionGithub action to run dependency check
Superseded by https://github.com/aquasecurity/trivy-operator
A curated list of awesome Kubernetes security resources
A curated list for Awesome Kubernetes Security resources
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
How to systematically secure anything: a repository about security engineering
This challenge is Inon Shkedy's 31 days API Security Tips.
drHEADer helps with the audit of security headers received in response to a single request or a list of requests.