Inspektor Gadget is a collection of tools (or gadgets) to debug and inspect Kubernetes resources and applications. It manages the packaging, deployment and execution of eBPF programs in a Kubernetes cluster, including many based on BCC tools, as well as some developed specifically for use in Inspektor Gadget. It automatically maps low-level kernel primitives to high-level Kubernetes resources, making it easier and quicker to find the relevant information. The Gadgets Inspektor Gadget tools are known as gadgets. You can deploy one, two or many gadgets. Explore the following documentation to find out which tools can help you in your investigations. advise: network-policy seccomp-profile audit: seccomp profile: block-io cpu tcprtt snapshot: process socket top: block-io ebpf file tcp trace: bind capabilities dns exec fsslower mount oomkill open signal sni tcp tcpconnect tcpdrop tcpretrans traceloop Installation Install Inspektor Gadget (client-side): Use krew plugin manager to install: $ kubectl krew install gadget Install Inspektor Gadget on Kubernetes: $ kubectl gadget deploy Read the detailed install instructions to find more information. How to use kubectl gadget --help will provide
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open-sourced framework for managing resources across hundreds of AWS Accounts
A tool for spinning up insecure AWS infrastructure with Terraform for training and security assessment purposes.
An AWS Lambda auditing tool that provides asset visibility and actionable results through statistical analysis and security checks.
gVisor is an application kernel that provides isolation for running sandboxed containers.
A fully managed service that securely stores, rotates, and manages sensitive data such as database credentials and API keys.
AWS Scout2 is a security tool for AWS administrators to assess their environment's security posture.
Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable fixes.
An open-source framework for testing and validating the security of AWS services and resources.
Tool for analyzing cloud resources against best practices and generating reports.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.