OWASP Foundation Web Respository
☆601Mar 7, 2026Updated this week
Alternatives and similar repositories for www-project-kubernetes-top-ten
Users that are interested in www-project-kubernetes-top-ten are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Kubernetes security resources☆956Dec 15, 2023Updated 2 years ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆769Dec 11, 2024Updated last year
- Checklist for container security - devsecops practices☆1,613Sep 15, 2025Updated 5 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,272Updated this week
- Peirates - Kubernetes Penetration Testing tool☆1,425Jan 20, 2026Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.☆405Sep 2, 2023Updated 2 years ago
- OWASP Kubernetes Security Testing Guide☆41Dec 22, 2025Updated 2 months ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,978May 20, 2025Updated 9 months ago
- A curated list for Awesome Kubernetes Security resources☆1,993Mar 1, 2026Updated last week
- Automating situational awareness for cloud penetration tests.☆2,303Updated this week
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,431Nov 18, 2025Updated 3 months ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆605Feb 10, 2026Updated last month
- Threat matrix for CI/CD Pipeline☆759Jul 8, 2024Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆350Mar 21, 2025Updated 11 months ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆592Nov 12, 2025Updated 3 months ago
- Security Remediation Guides