Discover vulnerabilities and container image misconfiguration in production environments.
☆55Jan 9, 2026Updated last month
Alternatives and similar repositories for cluster-image-scanner
Users that are interested in cluster-image-scanner are comparing it to the libraries listed below
Sorting:
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 3 months ago
- ☆12Jun 16, 2021Updated 4 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated last month
- Zero-dependency Linux memory forensics PoC — leverages kernel-embedded BTF and kallsyms for type-aware memory analysis without external d…☆69Updated this week
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- golang microservice boilerplate setup.☆13May 25, 2025Updated 9 months ago
- Automating the SQL Injection through Google dorks.☆26Sep 30, 2022Updated 3 years ago
- ☆11Feb 10, 2026Updated 3 weeks ago
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- A Go library for implementing command-line interfaces.☆36Nov 2, 2025Updated 4 months ago
- ☆33Aug 14, 2020Updated 5 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- ☆33Apr 20, 2022Updated 3 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Aug 26, 2020Updated 5 years ago
- ☆10Dec 5, 2025Updated 3 months ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Collection of red machine learning projects☆41Aug 16, 2021Updated 4 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- ForgeRock Identity Cloud Debug Tools☆11Jan 27, 2023Updated 3 years ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆42Feb 25, 2026Updated last week
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Apr 10, 2025Updated 10 months ago
- ☆41Jul 4, 2018Updated 7 years ago
- BambooHR Slack bot publishes company holidays, work anniversaries, first days, birthdays, and who is out each weekday.☆10Mar 4, 2023Updated 3 years ago
- GitHub Demo-Days '21 - How GitHub uses infrastructure as code☆11Mar 28, 2024Updated last year
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago