aquasecurity / harbor-scanner-trivyLinks
Use Trivy as a plug-in vulnerability scanner in the Harbor registry
☆224Updated 11 months ago
Alternatives and similar repositories for harbor-scanner-trivy
Users that are interested in harbor-scanner-trivy are comparing it to the libraries listed below
Sorting:
- ☆275Updated last month
- This project scans and assesses workloads in Kubernetes at runtime. It can apply protection rules to workloads to avoid further risks as …☆102Updated last year
- ☆21Updated this week
- Harbor Scanner Adapter for Anchore Engine and Enterprise☆39Updated this week
- Sidecar for managing OPA instances in Kubernetes.☆251Updated last week
- Static Analysis Library for Containers☆198Updated 2 years ago
- Community managed Helm charts for running Falco with Kubernetes☆269Updated this week
- A simple WebUI with latest events from Falco☆123Updated last week
- Harbor community-related material☆78Updated last month
- HELM chart to install NeuVector container cluster☆141Updated this week
- Kubernetes Pod Security Standards implementation - https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/2579-psp-replacem…☆101Updated this week
- Prometheus Metrics Exporter for Falco output events☆121Updated 4 months ago
- Use Clair as a plug-in vulnerability scanner in the Harbor registry☆35Updated last year
- Kubernetes operator for installing Calico and Calico Enterprise☆201Updated this week
- Falco plugins registry☆102Updated this week
- [DEPRECATED] Kubernetes operator for Harbor service components☆379Updated 3 weeks ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated last week
- Connect Falco to your ecosystem☆618Updated this week
- kube-scan: Octarine k8s cluster risk assessment tool☆804Updated 2 years ago
- Implementation of Kubernetes PodPreset as an Admission Webhook.☆65Updated 2 years ago
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆160Updated 3 weeks ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆222Updated 7 months ago
- Helm charts for StackRox Kubernetes Security Platform☆66Updated this week
- ☆1,218Updated this week
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆36Updated 10 months ago
- ☆24Updated this week
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆174Updated 2 weeks ago
- Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆92Updated this week
- Tool for synchronizing Helm Chart repositories.☆219Updated this week
- Simple scripts to benchmark kubernetes cluster features☆213Updated 3 years ago