A collection of manifests that create pods with different elevated privileges, demonstrating the impact of allowing security-sensitive pod attributes like hostNetwork, hostPID, hostPath, hostIPC, and privileged. The collection includes various Bad Pods with different configurations for testing and learning purposes.
Common questions about Bad Pods including features, pricing, alternatives, and user reviews.
Bad Pods is Collection of Kubernetes manifests creating pods with elevated privileges for security testing. It is a Security Operations solution designed to help security teams with Kubernetes, Kubernetes Security.
Bad Pods is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/BishopFox/badPods/ for download and installation instructions.
Popular alternatives to Bad Pods include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Bad Pods is for security teams and organizations that need Kubernetes, Kubernetes Security. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A collection of tips and tricks for container and container orchestration hacking and security testing.
A cross-platform post-exploitation HTTP/2 Command & Control framework designed specifically for testing and exploiting containerized environments including Docker and Kubernetes.
Private training course for IoT device pentesting and exploitation
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs