AI-Powered Docker Security Analyzer
☆98Feb 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for DockSec
Users that are interested in DockSec are comparing it to the libraries listed below
Sorting:
- ☆10Updated this week
- Work in progress to create an RFC that documents the OpenVPN protocol☆14Mar 9, 2026Updated last week
- Archive of Metasploit CTF challenges.☆14Jan 21, 2022Updated 4 years ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Ansible role for building and installing VirtualBox guest additions☆19Sep 28, 2023Updated 2 years ago
- Configure an LDAPS Endpoint for Simple AD☆14Aug 29, 2017Updated 8 years ago
- Comprehensive pfSense deployment, monitoring, and security knowledge base: From basic configuration to advanced SIEM infrastructure, IDS/…☆22Updated this week
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Security operations toolkit for AI coding agents. Give Claude Code 25+ skills to catch vulnerabilities, scan containers, detect secrets, …☆77Nov 23, 2025Updated 3 months ago
- Slides and references used for "Pragmatic Kotlin for Android Developers" talk at #DevfestAhm☆24Jan 5, 2018Updated 8 years ago
- A SBOM-centric security scanner.☆20Mar 14, 2026Updated last week
- Room database pre-population demo☆19Feb 28, 2026Updated 3 weeks ago
- The Swiss army knife for CRS developers☆13Mar 11, 2026Updated last week
- ☆11Jan 31, 2018Updated 8 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Demos for our research on Github actions script injection vulnerabilities☆13May 14, 2024Updated last year
- IR drill plateform☆23Jul 29, 2025Updated 7 months ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- Extensible static site generator☆43Feb 8, 2026Updated last month
- A Rust interface to ModSecurity☆18Dec 4, 2024Updated last year
- ☆20Aug 20, 2025Updated 7 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- ☆12Feb 2, 2024Updated 2 years ago
- Kotak Amal Pintar Menggunakan Sensor TCS3200 dan Telegram Bot☆10Jan 7, 2025Updated last year
- Log all AWS WAF Matched Rules to S3 and/or Loggly using Serverless☆17Jul 26, 2018Updated 7 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- A content filter for nginx, which returns the md5 hash of the content otherwise returned.☆17Jan 9, 2014Updated 12 years ago
- record har files for automated web pageloads☆13Jul 24, 2019Updated 6 years ago
- Repo for Virtual Core Dev Sprint 2020☆17Oct 23, 2020Updated 5 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Mar 4, 2015Updated 11 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆23Aug 13, 2024Updated last year
- ☆20Aug 27, 2021Updated 4 years ago
- ☆13Dec 2, 2022Updated 3 years ago
- Kubesonde: network policy testing and verification in K8s☆15Updated this week
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- Orca Security - IaC Security GitHub Action☆14Feb 6, 2025Updated last year
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21May 19, 2022Updated 3 years ago
- An example of how to use full text search on Django using database back-ends☆15Jan 10, 2016Updated 10 years ago