A collection of manifests that create pods with different elevated privileges, demonstrating the impact of allowing security-sensitive pod attributes like hostNetwork, hostPID, hostPath, hostIPC, and privileged. The collection includes various Bad Pods with different configurations for testing and learning purposes.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Weave Scope automatically generates a map of your application for troubleshooting and monitoring Docker & Kubernetes.
A cloud-native application protection platform that provides comprehensive security monitoring, vulnerability management, and threat detection for cloud environments and container workloads.
Open-source tool for analyzing AWS temporary tokens to detect malicious activity.
Open-source policy-as-code software for multi-cloud and SaaS environments with GPT model conversations and custom analysis policies.
Kube-bench is a tool for checking Kubernetes security based on CIS Kubernetes Benchmark.
A tool for discovering company infrastructure and apps on major cloud providers, beneficial for bug bounty hunters and penetration testers.
A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
Cloudmarker is a cloud monitoring tool and framework that audits Azure and GCP cloud environments.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.