kube-hunter Logo

kube-hunter

0
Free
Visit Website

kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes environments. You should NOT run kube-hunter on a Kubernetes cluster that you don't own! Run kube-hunter: kube-hunter is available as a container (aquasec/kube-hunter), and we also offer a web site at kube-hunter.aquasec.com where you can register online to receive a token allowing you to see and share the results online. You can also run the Python code yourself as described below. Explore vulnerabilities: The kube-hunter knowledge base includes articles about discoverable vulnerabilities and issues. When kube-hunter reports an issue, it will show its VID (Vulnerability ID) so you can look it up in the KB at https://aquasecurity.github.io/kube-hunter/

FEATURES

ALTERNATIVES

A vulnerability remediation platform that consolidates security findings, prioritizes risks using AI, and automates remediation workflows across cloud and application environments.

The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.

DOM-based XSS vulnerability scanner

Platform for users to test cybersecurity skills by exploiting vulnerabilities.

A non-profit organization focused on improving the security of software through resources and training.

Automate the search for Exploits and Vulnerabilities in important databases.

testssl.sh is a free command line tool for checking server's TLS/SSL configurations with clear and machine-readable output.