Bad Pods Logo

Bad Pods

0
Free
Visit Website

A collection of manifests that create pods with different elevated privileges, demonstrating the impact of allowing security-sensitive pod attributes like hostNetwork, hostPID, hostPath, hostIPC, and privileged. The collection includes various Bad Pods with different configurations for testing and learning purposes.

FEATURES

ALTERNATIVES

A tool that discovers all AWS resources created in an account

S3Scanner scans for misconfigured S3 buckets across S3-compatible APIs, identifying potential security vulnerabilities and data exposure risks.

A customized AWS EKS setup for PCI-DSS, SOC2, and HIPAA compliance

A tool to fetch all public IP addresses associated with an AWS account

A tool that determines what AWS API calls are logged by CloudTrail and what they are logged as, and can also be used as an attack simulation framework.

A Lambda Function that disables AWS IAM User Access Keys after a set amount of time to reduce the risk associated with old access keys.

A tool to identify publicly accessible S3 objects

Comprehensive set of security controls for various AWS services to ensure a secure cloud environment.