aquasecurity / trivy-dbLinks
☆271Updated 2 weeks ago
Alternatives and similar repositories for trivy-db
Users that are interested in trivy-db are comparing it to the libraries listed below
Sorting:
- Use Trivy as a plug-in vulnerability scanner in the Harbor registry☆223Updated 10 months ago
- Static Analysis Library for Containers☆198Updated 2 years ago
- NVD, Ubuntu, Alpine☆433Updated last week
- ☆184Updated 2 weeks ago
- Trivy's misconfiguration scanning engine☆218Updated 5 months ago
- Dependency Parser for Multiple Programming Languages☆148Updated last year
- foundation modules for scanning container packages and reporting vulnerabilities☆147Updated last week
- ☆1,200Updated this week
- Notice: Postee is no longer under active development or maintenance.☆211Updated last month
- Falco rule repository☆127Updated 3 weeks ago
- This project scans and assesses workloads in Kubernetes at runtime. It can apply protection rules to workloads to avoid further risks as …☆101Updated last year
- Web Application Firewall Testing Framework - Go version☆148Updated last week
- ☆36Updated this week
- A VS Code Extension for Trivy☆143Updated this week
- A utility to generate SPDX-compliant Bill of Materials manifests☆399Updated last week
- Plugin for Docker CLI to support SBOM creation using Syft☆157Updated 3 months ago
- Falco plugins registry☆98Updated last week
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆218Updated 5 months ago
- Connect Falco to your ecosystem☆605Updated last week
- OpenClarity is an open source platform built to enhance security and observability of cloud native applications and infrastructure☆1,421Updated last week
- Runtime detection and response for malicious events in Kubernetes workloads☆45Updated last year
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated last month
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆174Updated 5 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆346Updated 3 months ago
- Scanning and analysis for Black Duck SCA products.☆178Updated last week
- Generate a variety of suspect actions that are detected by Falco rulesets☆106Updated last month
- Support CI generation of SBOMs via golang tooling.☆424Updated 6 months ago
- Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive d…☆143Updated last week
- Creates CycloneDX Software Bill of Materials (SBOM) from Go modules☆157Updated last week
- Frontend UI for Dependency-Track☆127Updated last week