rbac-police
Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego (by PaloAltoNetworks)
DirtyCred
Kernel exploitation technique (by Markakd)
rbac-police | DirtyCred | |
---|---|---|
8 | 5 | |
322 | 558 | |
0.3% | - | |
0.0 | 0.6 | |
5 months ago | 6 months ago | |
Go | LLVM | |
MIT License | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
rbac-police
Posts with mentions or reviews of rbac-police.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-16.
- Rbac-police is an rbac assessment tool with eks rules
- Rbac-police is an awesome tool for container escapes in kubernetes
- Rbac-police is an awesome kubernetes security tool.
- Rbac-police audits kubernetes and finds paths to escape the pod and take over the cluster
- rbac-police audits kubernetes pods for container escape routes
- Check out rbac-police for k8s rbac testing
-
Blackhat 2022 recap – Trends and highlights
This Trampoline pod affects all major cloud providers with the default behavior and, for this, escaping the container means managing the entire cluster. They shared the tool rbac-policy that was presented in KubeCon EU.
- PaloAltoNetworks/rbac-police: Evaluate the RBAC permissions of serviceaccounts, pods and nodes in Kubernetes clusters through policies written in Rego
DirtyCred
Posts with mentions or reviews of DirtyCred.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-16.
- DirtyCred: DirtyCred is a kernel exploitation concept that swaps unprivileged kernel credentials with privileged ones to escalate privilege. Instead of overwriting any critical data fields on kernel heap, DirtyCred abuses the heap memory reuse mechanism to get privileged.
- DirtyCred: Linux Kernel Privilege Escalation
- GitHub - Markakd/DirtyCred
- DirtyCred (vulnerability for Linux found at BlackHat conference) - what is the deal with this? Media is making headlines about it but nothing here?
-
Blackhat 2022 recap – Trends and highlights
The new exploitation method presented by Zhenpeng Lin is called DirtyCred and is based on swapping Linux Kernel credentials. It’s simple, effective and generic. This allows it to perform container escape and still be an actual threat.
What are some alternatives?
When comparing rbac-police and DirtyCred you can also consider the following projects:
paralus - All-in-one Kubernetes access manager. User-level credentials, RBAC, SSO, audit logs.
rewrite - Automated mass refactoring of source code.
phantom-attack - POC for Phantom Attack
kubeclarity - KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems
falco - Cloud Native Runtime Security
rbac-tool - Rapid7 | insightCloudSec | Kubernetes RBAC Power Toys - Visualize, Analyze, Generate & Query
kube-bench - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
k-rail - Kubernetes security tool for policy enforcement