Simulator is a distributed systems and infrastructure simulator designed for attacking and debugging Kubernetes environments. The tool creates a Kubernetes cluster within an AWS account and runs scenarios that intentionally misconfigure the cluster or introduce vulnerabilities for training purposes. The simulator provides hands-on experience in identifying and mitigating security issues in Kubernetes deployments. It supports multiple authentication methods for provisioning AWS infrastructure, including environment variables and shared credentials files. The tool enables security professionals and developers to practice incident response and vulnerability remediation in a controlled environment. By creating realistic attack scenarios, users can develop skills in securing containerized applications and Kubernetes orchestration platforms. The simulator integrates with AWS services to provision the necessary infrastructure components and maintains the ability to simulate various attack vectors against Kubernetes clusters.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.
Industrial control system automation and testing tool for SCADA security testing.
Python tool for monitoring user-select APIs in Android apps using Frida.
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.
Extract local data storage of an Android application in one click.
An open-source phishing toolkit for businesses and penetration testers.
A tool for analyzing Android applications in local storage with various functionalities.
An open-source project for dynamic analysis of Android applications using the Android Substrate framework.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.