Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - for kind (and GKE, RKE2, AKS)
APACHE-2.0 License
Giving Kubernetes Superpowers to everyone
OpenShift Guide. Learn about the Red Hat OpenShift Container Platform, Data Science, Code Ready C...
This is a place for various problem detectors running on the Kubernetes nodes.
Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-regi...
eBPF-based Cloud Native Monitoring Tool
KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulne...
Network monitoring & diagnosis suite for Kubernetes
Winning Contribution of Michael Schwabe and David Lassig to BWI Data Analytics Hackathon 2020 in ...
Kubernetes pentesting, hardening and hunting tools.
📦 Make security testing of K8s, Docker, and Containerd easier.
eBPF based always-on profiler auto-discovering targets in Kubernetes and systemd, zero code chang...
A tool to scan Kubernetes cluster for risky permissions
Kubernetes CheatSheets In A4