Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like an attacker, and secure your Kubernetes, cloud, and container workloads right from the design, code, and architecture itself to prevent them. Use Kubernetes Goat to showcase the effectiveness of the tools, product, and solution. Also, educate the customers and share your product or tool knowledge in an interactive hands-on way.

Features

  • Sensitive keys in codebases
  • DIND (docker-in-docker) exploitation
  • Container escape to the host system
  • Helm v2 tiller to PwN the cluster
  • Kubernetes namespaces bypass
  • Secure network boundaries using NSP
  • Securing Kubernetes Clusters using Kyverno Policy Engine
  • Documentation available

Project Samples

Project Activity

See All Activity >

Categories

Clustering

License

MIT License

Follow Kubernetes Goat

Kubernetes Goat Web Site

Other Useful Business Software
Try Google Cloud Risk-Free With $300 in Credit Icon
Try Google Cloud Risk-Free With $300 in Credit

No hidden charges. No surprise bills. Cancel anytime.

Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Kubernetes Goat!

Additional Project Details

Operating Systems

Linux, Mac, Windows

Programming Language

JavaScript

Related Categories

JavaScript Clustering Software

Registered

2024-03-06