Skip to content

evanstoner/vulnapp

 
 

Repository files navigation

CrowdStrike's VulnApp

Docker Repository on Quay

Usage

kubectl apply -f  https://raw.githubusercontent.com/crowdstrike/vulnapp/main/vulnerable.example.yaml

Get web address:

watch -n 1 echo 'http://$(kubectl get service vulnerable-example-com  -o yaml -o=jsonpath="{.status.loadBalancer.ingress[0].ip}")/'

If the ip field is not present try:


watch -n 1 echo 'http://$(kubectl get service vulnerable-example-com  -o yaml -o=jsonpath="{.status.loadBalancer.ingress[0].hostname}")/'

Delete the app:

kubectl delete -f  https://raw.githubusercontent.com/crowdstrike/vulnapp/main/vulnerable.example.yaml

About

Run CrowdStrike's Detection Container in a Web Application

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 77.3%
  • Roff 17.1%
  • Makefile 2.7%
  • Shell 1.7%
  • Dockerfile 1.2%