GoogleCloudPlatform / inspec-gke-cis-benchmarkView external linksLinks
GKE CIS 1.1.0 Benchmark InSpec Profile
☆25Sep 7, 2021Updated 4 years ago
Alternatives and similar repositories for inspec-gke-cis-benchmark
Users that are interested in inspec-gke-cis-benchmark are comparing it to the libraries listed below
Sorting:
- GCP CIS 4.0.0 Benchmark InSpec Profile☆134Jan 6, 2026Updated last month
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Capture The Flag Challenge for eBPF Summit 2022☆19Oct 2, 2022Updated 3 years ago
- Simple shell scripts for DNS and DNSSEC monitoring☆18Apr 25, 2022Updated 3 years ago
- egrets monitors egress☆46Apr 12, 2020Updated 5 years ago
- ☆25Jun 27, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Jun 22, 2020Updated 5 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Oct 21, 2025Updated 3 months ago
- cli for jenkins ci☆20Mar 11, 2017Updated 8 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- In this work, we compared the predictive capabilities of six different machine learning algorithms - linear regression, random forest, ex…☆14Sep 21, 2020Updated 5 years ago
- Continuous Zero-Downtime Deployments for Kubernetes & Istio☆27Sep 20, 2018Updated 7 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- ☆29Jan 31, 2025Updated last year
- ☆30Jul 29, 2021Updated 4 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- ☆27Oct 1, 2025Updated 4 months ago
- [Deprecated] Automated Anthos Installation via Terraform for Equinix Metal with vSphere☆62Aug 28, 2024Updated last year
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆172Feb 6, 2025Updated last year
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- ☆73May 13, 2025Updated 9 months ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated last month
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- MWO Issue Tracker☆17Aug 22, 2017Updated 8 years ago
- Take automated actions against threats and vulnerabilities.☆216Sep 14, 2023Updated 2 years ago
- ☆74Sep 30, 2020Updated 5 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Apr 2, 2021Updated 4 years ago
- build distroless images with alpine tools☆130May 17, 2022Updated 3 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- PCI on GKE Blueprint: PCI Deployable Architecture on Google Cloud and GKE☆129Oct 1, 2020Updated 5 years ago
- This GitHub Action scans artifacts for secrets using gitleaks before uploading them.☆43Dec 6, 2025Updated 2 months ago