P3GLEG / Whaler
Program to reverse Docker images into Dockerfiles
☆1,102Updated 2 years ago
Alternatives and similar repositories for Whaler:
Users that are interested in Whaler are comparing it to the libraries listed below
- Container introspection tool. Find out what container runtime is being used as well as features available.☆1,024Updated 4 years ago
- Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.☆3,925Updated 8 months ago
- Docker registry v2 command line client and repo listing generator with security checks.☆1,671Updated 7 months ago
- Tools for observing Kubernetes resources in real time, powered by Pulumi.☆2,905Updated 9 months ago
- A service that analyzes docker images and scans for vulnerabilities☆1,587Updated 2 years ago
- use new container attach on already container go on debug☆589Updated last month
- Go library and CLIs for working with container registries☆3,238Updated this week
- Kubernetes Security - Best Practice Guide☆2,698Updated 5 years ago
- Custom & better AppArmor profile generator for Docker containers.☆1,187Updated 4 years ago
- container-diff: Diff your Docker containers☆3,766Updated 10 months ago
- Work with remote images registries - retrieving information, images, signing content☆8,592Updated 2 weeks ago
- Container Machines - Containers that look like Virtual Machines☆1,588Updated last year
- Reverse-engineer a Dockerfile from a Docker image.☆371Updated this week
- Vulnerability Static Analysis for Containers☆10,471Updated this week
- Kubernetes without the root privileges☆892Updated 3 weeks ago
- Simple Go-based setuid+setgid+setgroups+exec☆4,749Updated last week
- Validation of best practices in your Kubernetes clusters☆3,207Updated this week
- a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containe…☆1,166Updated last year
- Hunt for security weaknesses in Kubernetes clusters☆4,785Updated 10 months ago
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,217Updated this week
- Docker security analysis & hacking tools☆1,363Updated 4 years ago
- Linux-native "fake root" for implementing rootless containers☆1,029Updated last week
- Notary is a project that allows anyone to have trust over arbitrary collections of data☆3,244Updated 5 months ago
- Programs to keep Docker login credentials safe by storing in platform keystores☆1,135Updated last week
- Kubernetes shell: An integrated shell for working with the Kubernetes☆2,393Updated 2 years ago
- ⎈❏ Terminal and Web console for Kubernetes☆2,194Updated 7 months ago
- CLI for building apps using Cloud Native Buildpacks☆2,629Updated this week
- CLI and validation tools for Kubelet Container Runtime Interface (CRI) .☆1,738Updated this week
- 📦 Find and install kubectl plugins☆6,476Updated 3 months ago
- Validate your Kubernetes configuration files, supports multiple Kubernetes versions☆3,177Updated last year