aquasecurity / defsecLinks
Trivy's misconfiguration scanning engine
☆215Updated last year
Alternatives and similar repositories for defsec
Users that are interested in defsec are comparing it to the libraries listed below
Sorting:
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Notice: Postee is no longer under active development or maintenance.☆206Updated 2 weeks ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆130Updated last week
- Static Analysis Library for Containers☆197Updated 2 years ago
- a tool to audit the istio service mesh☆174Updated 4 years ago
- Runtime security plug to protect user containers☆67Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 10 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated 2 years ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆163Updated 2 months ago
- Open source compliance tool for development platforms.☆286Updated 2 years ago
- ☆106Updated 2 months ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆204Updated 2 years ago
- ☆67Updated this week
- Generate a variety of suspect actions that are detected by Falco rulesets☆115Updated 8 months ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆221Updated last year
- Administrative tooling for Falco☆121Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Falco plugins registry☆113Updated last week
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆161Updated last month
- ☆57Updated 2 weeks ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆69Updated 2 weeks ago
- Dynamic Application and API Security Testing☆194Updated 2 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- book website☆72Updated 4 years ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆181Updated 3 weeks ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated 2 years ago
- Kubernetes audit logging, when you don't control the control plane☆90Updated this week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- Documenting your Threat Models with HCL☆453Updated last month