aquasecurity / trivy-dbLinks
☆266Updated last week
Alternatives and similar repositories for trivy-db
Users that are interested in trivy-db are comparing it to the libraries listed below
Sorting:
- Use Trivy as a plug-in vulnerability scanner in the Harbor registry☆223Updated 8 months ago
- NVD, Ubuntu, Alpine☆430Updated this week
- Static Analysis Library for Containers☆198Updated last year
- ☆182Updated this week
- Trivy's misconfiguration scanning engine☆218Updated 4 months ago
- Dependency Parser for Multiple Programming Languages☆148Updated last year
- This project scans and assesses workloads in Kubernetes at runtime. It can apply protection rules to workloads to avoid further risks as …☆101Updated last year
- A utility to generate SPDX-compliant Bill of Materials manifests☆390Updated 2 weeks ago
- ☆35Updated 2 weeks ago
- A VS Code Extension for Trivy☆137Updated this week
- Falco rule repository☆125Updated last week
- Notice: Postee is no longer under active development or maintenance.☆211Updated this week
- Plugin for Docker CLI to support SBOM creation using Syft☆156Updated last month
- ☆1,189Updated this week
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated 2 weeks ago
- foundation modules for scanning container packages and reporting vulnerabilities☆147Updated this week
- KBOM - Kubernetes Bill of Materials☆315Updated 2 months ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆215Updated 4 months ago
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆201Updated this week
- Connect Falco to your ecosystem☆599Updated last week
- ✨🔐 CNCF Fuzzers☆124Updated 2 weeks ago
- Falco plugins registry☆96Updated this week
- Security configuration checks for popular cloud native applications and infrastructure.☆118Updated 3 years ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆205Updated 3 weeks ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆171Updated 4 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆345Updated 2 months ago
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆156Updated this week
- ☆20Updated this week
- Community managed Helm charts for running Falco with Kubernetes☆262Updated this week
- Service implementation for a Kubernetes Dynamic Webhook controller for interacting with Anchore☆64Updated 3 weeks ago