A collection of manifests that create pods with different elevated privileges, demonstrating the impact of allowing security-sensitive pod attributes like hostNetwork, hostPID, hostPath, hostIPC, and privileged. The collection includes various Bad Pods with different configurations for testing and learning purposes.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Open-source project for detecting security risks in cloud infrastructure accounts with support for AWS, Azure, GCP, OCI, and GitHub.
S3Scanner scans for misconfigured S3 buckets across S3-compatible APIs, identifying potential security vulnerabilities and data exposure risks.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
A collection of security workshops and hands-on content for AWS security services and techniques
Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.
Tool for assessing compliance and running vulnerability scans on Docker images.
A free training course and lab environment for learning to test and attack cloud infrastructure, including AWS and Azure.
A detection-as-code platform for streamlining cloud security operations and responding to security incidents.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.