tldr.runtldr.run

Kubernetes Goat

cloud security
penetration testing and red teaming
container and kubernetes security
security awareness and training
devsecops and continuous security

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground šŸš€

Snapshots

Kubernetes Goat screenshot 1

Tool Info

License
MIT
Availability
Open Source, Free
Rating
0.0 ā­ (0 ratings)
Featured
Yes

More Like This...

Need a quick way to visualize your current aws/amazon ec2 security group configuration? aws-security-viz does just that based on the EC2 security group ingress configuration.

cloud security
identity and access management (iam)
compliance and governance
Open Source, Free

Stratus Red Team is "Atomic Red Teamā„¢" for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner. Granular, Actionable Adversary Emulation for the Cloud.

cloud security
container and kubernetes security
penetration testing and red teaming
Open Source, Free

Terrascan

0.0(0)

Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.

vulnerability management and assessment
cloud security
container and kubernetes security
Open Source

CDK

0.0(0)

CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency. It comes with useful net-tools and many powerful PoCs/EXPs and helps you to escape container and take over K8s cluster easily.

cloud security
container and kubernetes security
devsecops and continuous security
Open Source, Free

User Reviews

Please log in to write a review.

All Reviews

No reviews yet. Be the first to review this tool!

Share Your Security Tool with the World

Have a powerful tool that helps enhance security or privacy? Submit your tool and showcase it to a community of professionals and developers. Your contribution could shape the future of security technology.