Redguard / csvs
Container Security Verification Standard
☆36Updated 5 years ago
Alternatives and similar repositories for csvs:
Users that are interested in csvs are comparing it to the libraries listed below
- AppSecPipeline Specification for DevOps automation.☆38Updated 2 years ago
- AWS Metadata Proxy for protection against SSRF☆67Updated 4 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆78Updated 7 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆44Updated 5 years ago
- ☆11Updated 6 years ago
- ☆20Updated 6 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- ☆33Updated 5 years ago
- ☆55Updated 7 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Owasp Zap chart for Kubernetes☆49Updated 2 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 6 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Updated 5 years ago
- Hardening and Auditing Tool For Docker Hosts & Containers☆68Updated 9 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆44Updated 7 years ago
- Push-button Security Operations Center using Kubernetes☆12Updated 8 years ago
- ☆57Updated 4 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆37Updated 4 years ago
- Dockerfiles for containerized osquery☆13Updated 7 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Updated 4 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Updated 5 years ago
- ☆11Updated 6 years ago
- A More or less Random Collection of Scripts for security Testing.☆64Updated 2 years ago
- The clever vulnerability dependency finder☆96Updated 2 years ago