Deploy a privileged pod, escape to the host via chroot, and detect the full attack chain with eBPF and Gatekeeper policies
Read tutorial →Build a trojanized container image with a hidden cryptominer, detect it with Falco and eBPF, and defend with image scanning and admission control
Read tutorial →Transform ELF binaries into fileless payloads, execute them in read-only Kubernetes pods via memfd_create, and observe the full attack chain with eBPF
Read tutorial →Exploit a Flask/Jinja2 Server-Side Template Injection to gain remote code execution inside a Kubernetes pod, then observe the attack with eBPF
Read tutorial →