SDA-SE / cluster-image-scanner
Discover vulnerabilities and container image misconfiguration in production environments.
☆55Updated 3 weeks ago
Alternatives and similar repositories for cluster-image-scanner:
Users that are interested in cluster-image-scanner are comparing it to the libraries listed below
- ☆93Updated last month
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Protect against subdomain takeover☆93Updated 10 months ago
- OWASP Kubernetes Security Testing Guide☆37Updated 6 months ago
- A utility to (re-)import findings and language data into DefectDojo☆42Updated 5 months ago
- ☆21Updated 4 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated last year
- Kubernetes Pwnage for all☆56Updated 4 years ago
- ☆175Updated 4 months ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Kubernetes Security Testing Guide☆26Updated 11 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 8 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆80Updated 2 months ago
- Offensive Terraform Website☆44Updated 4 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆162Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆91Updated last month
- Security scanning & static analysis tool☆94Updated 5 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- Tool for auditing RBACs in Kubernetes☆215Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- ☆18Updated 3 years ago
- Dynamic Application and API Security Testing☆192Updated last year
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- WAF bypass PoC☆46Updated last year