Automatic AppArmor management for Docker containers
☆16Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for docker-sec
Users that are interested in docker-sec are comparing it to the libraries listed below
Sorting:
- ☆11Feb 22, 2016Updated 10 years ago
- A tiny Debugger : - )☆10Jan 24, 2021Updated 5 years ago
- Provide a trusted platform for with Image Encryption capabilities with secure key delivery and management based in root of trust and host…☆10Jul 21, 2020Updated 5 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- Small container runtime for threat detection☆14Apr 13, 2025Updated 10 months ago
- ☆13Oct 8, 2021Updated 4 years ago
- A demo helps you have a quick start to Tencent Cloud Mesh 🚀☆11Sep 9, 2022Updated 3 years ago
- For paper Container-IMA: https://www.usenix.org/system/files/raid2019-luo.pdf☆12Mar 12, 2020Updated 5 years ago
- ☆11Oct 10, 2024Updated last year
- Generate an application profile containing metrics/properties for Kubernetes workloads based on runtime behavior.☆14Oct 1, 2024Updated last year
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated last year
- The Volcano Descheduler☆23Jan 24, 2025Updated last year
- Time_series_forecasting in R using ARIMA,Auto ARIMA ,Arimax and Holt Winters☆22Nov 14, 2017Updated 8 years ago
- A container engine from scratch in C language, without any LXC or Docker☆18Jun 17, 2022Updated 3 years ago
- Code supporting capabilities blog☆20Sep 25, 2019Updated 6 years ago
- Trustzone vexpress helloworld example☆18May 1, 2016Updated 9 years ago
- eBPF-based SYN Flood Detector☆23Oct 9, 2020Updated 5 years ago
- Dragonball-sandbox is a collection of Rust crates to help build custom Virtual Machine Monitors and hypervisors.☆94Jul 17, 2023Updated 2 years ago
- ☆21Apr 15, 2022Updated 3 years ago
- Trusted Service Identity is closing the gap of preventing access to secrets by an untrusted operator during the process of obtaining auth…☆27Sep 17, 2025Updated 5 months ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆29Jul 29, 2024Updated last year
- ☆28Nov 16, 2021Updated 4 years ago
- KVM-based virtual machine introspection for malware analysis☆29May 11, 2017Updated 8 years ago
- ☆30Mar 20, 2022Updated 3 years ago
- ☆28Nov 24, 2021Updated 4 years ago
- CVE-2022-0492 EXP and Analysis write up☆33Mar 11, 2022Updated 3 years ago
- Auto packaging for Talon Voice [maintainer=@adisbladis]☆37Feb 12, 2026Updated 2 weeks ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- a serverless db service based on TiDB on the cloud, implementing dynamically scale the compute and storage nodes based on business load c…☆28Oct 25, 2021Updated 4 years ago
- Provides allocations and release strategies for resources used during the lifetime of a VM.☆33Updated this week
- Discover least permissive security posture, Network Microsegmentation, and Application behaviour based on visibility/observability data e…☆34May 19, 2025Updated 9 months ago
- awesome resources about cloud native security 🐿☆324Nov 4, 2023Updated 2 years ago
- ExitLess services for SGX enclaves☆34Sep 10, 2019Updated 6 years ago
- Fedora Policy Contributions☆39May 17, 2021Updated 4 years ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Jun 16, 2020Updated 5 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Aug 3, 2021Updated 4 years ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago