Kubeadm is a tool designed to provide best-practice 'fast paths' for creating Kubernetes clusters by performing the necessary actions to set up a minimum viable, secure cluster in a user-friendly manner. Its scope is limited to the local node filesystem and the Kubernetes API, serving as a composable building block for higher-level tools. Common cmdlets include kubeadm init for bootstrapping the initial control-plane node, kubeadm join for adding worker or control plane nodes to the cluster, kubeadm upgrade for updating the cluster, and kubeadm reset for reverting changes made by kubeadm init or kubeadm join.
FEATURES
ALTERNATIVES
AI-Powered Cloud Assistant for building, securing, and operating cloud environments.
Burp extension for identifying cloud buckets and testing for vulnerabilities
Weave Scope automatically generates a map of your application for troubleshooting and monitoring Docker & Kubernetes.
Create Docker container images for testing and long-term use.
A set of tools for fingerprinting and exploiting Amazon cloud infrastructures
A cloud security solution that provides agentless application mapping and vulnerability prioritization based on business impact across cloud environments.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.