{"id":35830,"date":"2025-01-28T07:13:42","date_gmt":"2025-01-28T07:13:42","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=35830"},"modified":"2025-01-28T07:13:43","modified_gmt":"2025-01-28T07:13:43","slug":"kata-containers","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/kata-containers\/","title":{"rendered":"Kata Containers : Bridging The Gap Between Containers And Virtual Machines"},"content":{"rendered":"\n<p>Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>License<\/strong><a href=\"https:\/\/github.com\/kata-containers\/kata-containers#license\"><\/a><\/h2>\n\n\n\n<p>The code is licensed under the Apache 2.0 license. See <a href=\"https:\/\/github.com\/kata-containers\/kata-containers\/blob\/main\/LICENSE\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the license file<\/a> for further details.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Platform Support<\/strong><a href=\"https:\/\/github.com\/kata-containers\/kata-containers#platform-support\"><\/a><\/h2>\n\n\n\n<p>Kata Containers currently runs on 64-bit systems supporting the following technologies:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Architecture<\/th><th>Virtualization technology<\/th><\/tr><\/thead><tbody><tr><td><code>x86_64<\/code>, <code>amd64<\/code><\/td><td>Intel VT-x, AMD SVM<\/td><\/tr><tr><td><code>aarch64<\/code> (&#8220;<code>arm64<\/code>&#8220;)<\/td><td>ARM Hyp<\/td><\/tr><tr><td><code>ppc64le<\/code><\/td><td>IBM Power<\/td><\/tr><tr><td><code>s390x<\/code><\/td><td>IBM Z &amp; LinuxONE SIE<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Hardware Requirements<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/github.com\/kata-containers\/kata-containers#hardware-requirements\"><\/a>The <a href=\"https:\/\/github.com\/kata-containers\/kata-containers\/blob\/main\/src\/runtime\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Kata Containers runtime<\/a> provides a command to determine if your host system is capable of running and creating a Kata Container:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ kata-runtime check<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/kata-containers\/kata-containers\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. License The code is licensed under the Apache 2.0 license. See the license file for further details. Platform Support [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":35833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[40],"tags":[6321,6052,6325,7032],"class_list":["post-35830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kata Containers : Bridging The Gap Between Containers And<\/title>\n<meta name=\"description\" content=\"Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/kata-containers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kata Containers : Bridging The Gap Between Containers And\" \/>\n<meta property=\"og:description\" content=\"Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/kata-containers\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T07:13:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-28T07:13:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Kata Containers : Bridging The Gap Between Containers And Virtual Machines\",\"datePublished\":\"2025-01-28T07:13:42+00:00\",\"dateModified\":\"2025-01-28T07:13:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/\"},\"wordCount\":120,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp\",\"keywords\":[\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Kata Containers\"],\"articleSection\":[\"TECH\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/kata-containers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/\",\"name\":\"Kata Containers : Bridging The Gap Between Containers And\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp\",\"datePublished\":\"2025-01-28T07:13:42+00:00\",\"dateModified\":\"2025-01-28T07:13:43+00:00\",\"description\":\"Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs)\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/kata-containers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kata-containers\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp\",\"width\":1600,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kata Containers : Bridging The Gap Between Containers And","description":"Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/kata-containers\/","og_locale":"en_US","og_type":"article","og_title":"Kata Containers : Bridging The Gap Between Containers And","og_description":"Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs)","og_url":"https:\/\/kalilinuxtutorials.com\/kata-containers\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-01-28T07:13:42+00:00","article_modified_time":"2025-01-28T07:13:43+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp","type":"image\/webp"}],"author":"Varshini","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/kata-containers\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/kata-containers\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Kata Containers : Bridging The Gap Between Containers And Virtual Machines","datePublished":"2025-01-28T07:13:42+00:00","dateModified":"2025-01-28T07:13:43+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kata-containers\/"},"wordCount":120,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kata-containers\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp","keywords":["informationsecurity","kalilinux","kalilinuxtools","Kata Containers"],"articleSection":["TECH"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/kata-containers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/kata-containers\/","url":"https:\/\/kalilinuxtutorials.com\/kata-containers\/","name":"Kata Containers : Bridging The Gap Between Containers And","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kata-containers\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kata-containers\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp","datePublished":"2025-01-28T07:13:42+00:00","dateModified":"2025-01-28T07:13:43+00:00","description":"Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs)","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/kata-containers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/kata-containers\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp","width":1600,"height":900},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Kata-Containers.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":26022,"url":"https:\/\/kalilinuxtutorials.com\/lockc\/","url_meta":{"origin":35830,"position":0},"title":"Lockc : Making Containers More Secure With eBPF And Linux Security Modules (LSM)","author":"R K","date":"July 18, 2022","format":false,"excerpt":"lockc\u00a0is open source sofware for providing MAC (Mandatory Access Control) type of security audit for container workloads. The main reason why\u00a0lockc\u00a0exists is that\u00a0containers do not contain. Containers are not as secure and isolated as VMs. By default, they expose a lot of information about host OS and provide ways to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiE1uVGAlJj9JfcUzlljge0YxR6ddPgnGQo-z0Ds1dV_3Pml9cIi8YslK930s_rT6eRmpDbnb19HC2Ur-3ud395T1IuSZAArTkxUSvVIWNWLLEOXaEhUjpAfIXPbWLHXkR9JNtQSHOeIykIRgEJSFhBawkhJn505GnbScnmC71qOJE-n-nDGaNwb8gp\/s1058\/logo-horizontal-lockc%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiE1uVGAlJj9JfcUzlljge0YxR6ddPgnGQo-z0Ds1dV_3Pml9cIi8YslK930s_rT6eRmpDbnb19HC2Ur-3ud395T1IuSZAArTkxUSvVIWNWLLEOXaEhUjpAfIXPbWLHXkR9JNtQSHOeIykIRgEJSFhBawkhJn505GnbScnmC71qOJE-n-nDGaNwb8gp\/s1058\/logo-horizontal-lockc%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiE1uVGAlJj9JfcUzlljge0YxR6ddPgnGQo-z0Ds1dV_3Pml9cIi8YslK930s_rT6eRmpDbnb19HC2Ur-3ud395T1IuSZAArTkxUSvVIWNWLLEOXaEhUjpAfIXPbWLHXkR9JNtQSHOeIykIRgEJSFhBawkhJn505GnbScnmC71qOJE-n-nDGaNwb8gp\/s1058\/logo-horizontal-lockc%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiE1uVGAlJj9JfcUzlljge0YxR6ddPgnGQo-z0Ds1dV_3Pml9cIi8YslK930s_rT6eRmpDbnb19HC2Ur-3ud395T1IuSZAArTkxUSvVIWNWLLEOXaEhUjpAfIXPbWLHXkR9JNtQSHOeIykIRgEJSFhBawkhJn505GnbScnmC71qOJE-n-nDGaNwb8gp\/s1058\/logo-horizontal-lockc%20%281%29.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiE1uVGAlJj9JfcUzlljge0YxR6ddPgnGQo-z0Ds1dV_3Pml9cIi8YslK930s_rT6eRmpDbnb19HC2Ur-3ud395T1IuSZAArTkxUSvVIWNWLLEOXaEhUjpAfIXPbWLHXkR9JNtQSHOeIykIRgEJSFhBawkhJn505GnbScnmC71qOJE-n-nDGaNwb8gp\/s1058\/logo-horizontal-lockc%20%281%29.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":13512,"url":"https:\/\/kalilinuxtutorials.com\/metarget\/","url_meta":{"origin":35830,"position":1},"title":"Metarget : Framework Providing Automatic Constructions Of Vulnerable Infrastructures","author":"R K","date":"June 18, 2021","format":false,"excerpt":"Metarget =\u00a0meta-\u00a0+\u00a0target, a framework providing automatic constructions of vulnerable infrastructures, used to deploy simple or complicated vulnerable cloud native targets swiftly and automatically. Why Metarget? During security researches, we might find that the deployment of vulnerable environment often takes much time, while the time spent on testing PoC or ExP\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36459,"url":"https:\/\/kalilinuxtutorials.com\/yarahunter\/","url_meta":{"origin":35830,"position":2},"title":"YaraHunter : A Comprehensive Malware Scanning Tool","author":"Varshini","date":"February 14, 2025","format":false,"excerpt":"YaraHunter, developed by Deepfence, is a versatile malware scanner designed for cloud-native environments. It leverages YARA rulesets to detect indicators of compromise (IOCs) in container images, running Docker containers, and local filesystems. By identifying resources that match known malware signatures, YaraHunter helps ensure the security of infrastructure against potential threats.\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YaraHunter-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YaraHunter-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YaraHunter-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YaraHunter-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YaraHunter-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YaraHunter-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":12902,"url":"https:\/\/kalilinuxtutorials.com\/kubearmor-container-aware-runtime-security-enforcement-system\/","url_meta":{"origin":35830,"position":3},"title":"KubeArmor : Container-aware Runtime Security Enforcement System","author":"R K","date":"May 17, 2021","format":false,"excerpt":"Introduction to KubeArmor KubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file access, networking operation, and resource utilization) of containers at the system level. KubeArmor operates with\u00a0Linux security modules (LSMs), meaning that it can work on top of any Linux platforms (such\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":33680,"url":"https:\/\/kalilinuxtutorials.com\/varmor\/","url_meta":{"origin":35830,"position":4},"title":"vArmor : Enhancing Container Security In Cloud-Native Environments","author":"Varshini","date":"July 5, 2024","format":false,"excerpt":"vArmor is a cloud-native container sandbox system. It leverages Linux's\u00a0AppArmor LSM,\u00a0BPF LSM\u00a0and\u00a0Seccomp\u00a0technologies to implement enforcers. It can be used to strengthen container isolation, reduce the kernel attack surface, and increase the difficulty and cost of container escape or lateral movement attacks. You can leverage vArmor in the following scenarios to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-tge1WGIeHY3pFnSuzl29m3MjN8DmIcv-QD93Yx3gdpcjznWV3-jdseYbihP4DYCqXYf3fDM5OxMe9_F25olmNfHlNTQ0x7dUjxHWJuNiVYK-Kt87AwYlZ1JxLBpnkNbMP6joW-cZeDDKlseT5Ah5vb2lSDehy1Hxqugtxa0J7C3aPrLzKqEd3dYOgGPD\/s16000\/vArmor%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-tge1WGIeHY3pFnSuzl29m3MjN8DmIcv-QD93Yx3gdpcjznWV3-jdseYbihP4DYCqXYf3fDM5OxMe9_F25olmNfHlNTQ0x7dUjxHWJuNiVYK-Kt87AwYlZ1JxLBpnkNbMP6joW-cZeDDKlseT5Ah5vb2lSDehy1Hxqugtxa0J7C3aPrLzKqEd3dYOgGPD\/s16000\/vArmor%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-tge1WGIeHY3pFnSuzl29m3MjN8DmIcv-QD93Yx3gdpcjznWV3-jdseYbihP4DYCqXYf3fDM5OxMe9_F25olmNfHlNTQ0x7dUjxHWJuNiVYK-Kt87AwYlZ1JxLBpnkNbMP6joW-cZeDDKlseT5Ah5vb2lSDehy1Hxqugtxa0J7C3aPrLzKqEd3dYOgGPD\/s16000\/vArmor%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-tge1WGIeHY3pFnSuzl29m3MjN8DmIcv-QD93Yx3gdpcjznWV3-jdseYbihP4DYCqXYf3fDM5OxMe9_F25olmNfHlNTQ0x7dUjxHWJuNiVYK-Kt87AwYlZ1JxLBpnkNbMP6joW-cZeDDKlseT5Ah5vb2lSDehy1Hxqugtxa0J7C3aPrLzKqEd3dYOgGPD\/s16000\/vArmor%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-tge1WGIeHY3pFnSuzl29m3MjN8DmIcv-QD93Yx3gdpcjznWV3-jdseYbihP4DYCqXYf3fDM5OxMe9_F25olmNfHlNTQ0x7dUjxHWJuNiVYK-Kt87AwYlZ1JxLBpnkNbMP6joW-cZeDDKlseT5Ah5vb2lSDehy1Hxqugtxa0J7C3aPrLzKqEd3dYOgGPD\/s16000\/vArmor%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj-tge1WGIeHY3pFnSuzl29m3MjN8DmIcv-QD93Yx3gdpcjznWV3-jdseYbihP4DYCqXYf3fDM5OxMe9_F25olmNfHlNTQ0x7dUjxHWJuNiVYK-Kt87AwYlZ1JxLBpnkNbMP6joW-cZeDDKlseT5Ah5vb2lSDehy1Hxqugtxa0J7C3aPrLzKqEd3dYOgGPD\/s16000\/vArmor%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":14290,"url":"https:\/\/kalilinuxtutorials.com\/gorsair\/","url_meta":{"origin":35830,"position":5},"title":"Gorsair : Hacks Its Way Into Remote Docker Containers That Expose Their APIs","author":"R K","date":"July 8, 2021","format":false,"excerpt":"Gorsair is a penetration testing tool for discovering and remotely accessing Docker APIs from vulnerable Docker containers. Once it has access to the docker daemon, you can use Gorsair to directly execute commands on remote containers. Exposing the docker API on the internet is a tremendous risk, as it can\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=35830"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35830\/revisions"}],"predecessor-version":[{"id":35832,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35830\/revisions\/35832"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/35833"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=35830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=35830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=35830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}