AI-Powered Docker Security Analyzer
☆158Apr 17, 2026Updated 2 weeks ago
Alternatives and similar repositories for DockSec
Users that are interested in DockSec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible integration for Secrets Manager☆13Apr 15, 2026Updated 2 weeks ago
- ☆15Mar 12, 2025Updated last year
- Archive of Metasploit CTF challenges.☆14Jan 21, 2022Updated 4 years ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- ☆24Oct 26, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Netbird Collection for Ansible☆23Apr 13, 2026Updated 2 weeks ago
- Configure an LDAPS Endpoint for Simple AD☆14Aug 29, 2017Updated 8 years ago
- For Python ID X Traveloka Jakarta Spesial Kartini☆10Apr 20, 2018Updated 8 years ago
- Repository for the markdownlint-mdl-action Github Action☆25Dec 26, 2025Updated 4 months ago
- Automated deployment and testing for AWS Service Control Policies☆35Jan 19, 2024Updated 2 years ago
- A SBOM-centric security scanner.☆21Updated this week
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Pipe data straight to an S3 key of your choice☆21Jan 21, 2014Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A DNS polling library that makes Node.js HTTP clients resilient to DNS errors☆15Dec 9, 2022Updated 3 years ago
- Demos for our research on Github actions script injection vulnerabilities☆13May 14, 2024Updated last year
- A walkthrough of how a Kubernetes Pod can be exploited by a hacker☆11Aug 29, 2023Updated 2 years ago
- IR drill plateform☆23Jul 29, 2025Updated 9 months ago
- Solution to customize the block period for an AWS WAF rate-based rule to prevent malicious actors from reusing the same set of IP address…☆20Jun 26, 2025Updated 10 months ago
- Extensible static site generator☆43Apr 18, 2026Updated last week
- ☆20Aug 20, 2025Updated 8 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- create labipa using vagrant☆14Oct 23, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆13Sep 7, 2023Updated 2 years ago
- Log all AWS WAF Matched Rules to S3 and/or Loggly using Serverless☆17Jul 26, 2018Updated 7 years ago
- record har files for automated web pageloads☆13Jul 24, 2019Updated 6 years ago
- A Gatsby Starter Tech Blog template☆13Apr 13, 2019Updated 7 years ago
- Security operations toolkit for AI coding agents. Give Claude Code 25+ skills to catch vulnerabilities, scan containers, detect secrets, …☆125Apr 15, 2026Updated 2 weeks ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆24Aug 13, 2024Updated last year
- ☆13Dec 2, 2022Updated 3 years ago
- Central correlator for opencanary instances☆17Feb 3, 2022Updated 4 years ago
- ☆37Feb 25, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Orca Security - IaC Security GitHub Action☆14Feb 6, 2025Updated last year
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21May 19, 2022Updated 3 years ago
- TriggerMesh CLI to work with knative objects☆83May 9, 2023Updated 2 years ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated 2 months ago
- Generate a firewall-like report for AWS Security Groups☆14Mar 31, 2023Updated 3 years ago
- An example of how to use full text search on Django using database back-ends☆15Jan 10, 2016Updated 10 years ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago