Hacking Kubernetes
Course on K8 security and hacking
Lab_01 - Running Workloads ImperativelyLab_02 - The Declarative ModelLab_03 - Persisting DataLab_04 - NetworkingLab_05 - Hardening K8sLab_06 - Hacking From the OutsideLab_07 - Hacking From the InsideLab_08 - Kubernetes Post-ExploitationLab_09 - Kubernetes Post-Exploitation Part 2Course MaterialsToolsUseful commands