SDA-SE / cluster-image-scanner
Discover vulnerabilities and container image misconfiguration in production environments.
☆55Updated last month
Alternatives and similar repositories for cluster-image-scanner:
Users that are interested in cluster-image-scanner are comparing it to the libraries listed below
- a tool to audit the istio service mesh☆173Updated 3 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- ☆94Updated 2 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- A utility to (re-)import findings and language data into DefectDojo☆43Updated 6 months ago
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- Protect against subdomain takeover☆93Updated 10 months ago
- OWASP Kubernetes Security Testing Guide☆37Updated 7 months ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 4 months ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- ☆35Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 3 months ago
- Dynamic Application and API Security Testing☆192Updated 2 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆154Updated 7 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆132Updated last year
- ☆27Updated 5 months ago
- ☆176Updated 4 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆62Updated 9 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated last week
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- Kubernetes audit logging, when you don't control the control plane☆73Updated last week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 10 months ago
- ☆60Updated 2 months ago
- ☆74Updated 4 years ago