anchore / syftLinks
CLI tool and library for generating a Software Bill of Materials from container images and filesystems
☆8,286Updated this week
Alternatives and similar repositories for syft
Users that are interested in syft are comparing it to the libraries listed below
Sorting:
- A vulnerability scanner for container images and filesystems☆11,434Updated this week
- Code signing and transparency for containers and binaries☆5,615Updated this week
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆31,199Updated this week
- Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supp…☆3,559Updated this week
- Cloud Native Runtime Security☆8,607Updated this week
- Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.☆5,200Updated 2 months ago
- Vulnerability Static Analysis for Containers☆10,913Updated this week
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,562Updated this week
- Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start☆3,212Updated last year
- Tfsec is now part of Trivy☆6,945Updated 2 months ago
- OpenSSF Scorecard - Security health metrics for Open Source☆5,255Updated this week
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,898Updated 2 weeks ago
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆8,394Updated this week
- API traffic analyzer for Kubernetes, providing deep packet inspection with complete API and Kubernetes contexts, retaining cluster-wide L…☆11,740Updated last week
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,442Updated last week
- Hunt for security weaknesses in Kubernetes clusters☆4,989Updated last year
- Open source vulnerability DB and triage service.☆2,468Updated this week
- A service that analyzes docker images and scans for vulnerabilities☆1,592Updated 3 years ago
- Supply-chain Levels for Software Artifacts☆1,800Updated last week
- OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys.☆5,294Updated this week
- Work with remote images registries - retrieving information, images, signing content☆10,378Updated last week
- Linux Runtime Security and Forensics using eBPF☆4,357Updated this week
- KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adh…☆3,379Updated last week
- Cloud native secrets management for developers - never leave your command line for secrets.☆3,164Updated this week
- Boundary enables identity-based access management for dynamic infrastructure.☆3,990Updated last week
- Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security…☆11,153Updated last week
- eBPF-based Security Observability and Runtime Enforcement☆4,379Updated this week
- 🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.☆4,112Updated last week
- Write tests against structured configuration data using the Open Policy Agent Rego query language☆3,109Updated this week
- 👀 A Kubernetes cluster resource sanitizer☆6,226Updated last month