SDA-SE / cluster-image-scanner
Discover vulnerabilities and container image misconfiguration in production environments.
☆54Updated this week
Alternatives and similar repositories for cluster-image-scanner:
Users that are interested in cluster-image-scanner are comparing it to the libraries listed below
- Protect against subdomain takeover☆92Updated 8 months ago
- A utility to (re-)import findings and language data into DefectDojo☆42Updated 4 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- a tool to audit the istio service mesh☆174Updated 3 years ago
- OWASP Kubernetes Security Testing Guide☆37Updated 5 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- ☆92Updated 2 weeks ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆162Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆79Updated last month
- Kubernetes audit logging, when you don't control the control plane☆67Updated this week
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- ☆175Updated 2 months ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆38Updated 5 months ago
- ☆15Updated 7 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆77Updated 11 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆67Updated 2 years ago
- WAF bypass PoC☆46Updated last year
- ☆21Updated 3 months ago
- The security workflow engine!☆95Updated this week
- boostsecurityio/lotp☆112Updated this week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 2 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆52Updated 3 weeks ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆82Updated last week