kubernetes-goat
ICS-Security-Tools
kubernetes-goat | ICS-Security-Tools | |
---|---|---|
18 | 2 | |
3,873 | 1,522 | |
- | 1.6% | |
4.7 | 5.4 | |
about 1 month ago | 22 days ago | |
HTML | HTML | |
MIT License | Creative Commons Attribution 4.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubernetes-goat
- Broke down K8S images?
- Kubernetes Goat: An Interactive Kubernetes Security Learning Playground
- Kubernetes Goat: Interactive Kubernetes Security Learning Playground
- Kubernetes Goat is designed to be intentionally vulnerable cluster environment
- Welcome to Kubernetes Goat | Kubernetes Goat
-
Kubernetes Goat - Interactive Kubernetes Security Learning Playground 🚀
👉 Check out the docs: https://madhuakula.com/kubernetes-goat
👉 Checkout the docs: https://madhuakula.com/kubernetes-goat 🌟 Star in Github: https://github.com/madhuakula/kubernetes-goat Please share your valuable, feedback, ideas, and suggestion 🙏
- madhuakula/kubernetes-goat - Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security
- Kubernetes Goat - Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security
ICS-Security-Tools
What are some alternatives?
WebGoat - WebGoat is a deliberately insecure application
Scada-LTS - Scada-LTS is an Open Source, web-based, multi-platform solution for building your own SCADA (Supervisory Control and Data Acquisition) system.
awesome-kubernetes-security - A curated list of awesome Kubernetes security resources
FISSURE - The RF and reverse engineering framework for everyone. Follow and ★ to show your support!
runtime - Kata Containers version 1.x runtime (for version 2.x see https://github.com/kata-containers/kata-containers).
Automator-Terminator - A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
p8-smartwatch-hacking - P8 Smartwatch (Colmi) hacking
Reverse-Engineering - List of awesome reverse engineering resources
inspr - Inspr is an agnostic application mesh for simpler, faster, and securer development of distributed applications (dApps).
react-visual-grid - 🪟 Image Grid / Masonry Layout for React
introduction-to-docker-ebook - Free Introduction to Docker eBook
awesome-ics-writeups - Collection of writeups on ICS/SCADA security.