aquasecurity / vexhubLinks
☆28Updated this week
Alternatives and similar repositories for vexhub
Users that are interested in vexhub are comparing it to the libraries listed below
Sorting:
- Audit your GitHub Actions workflow runs to see exactly which Actions were downloaded☆76Updated last week
- Protect GitHub Actions with Tracee☆80Updated 9 months ago
- ☆57Updated this week
- A tool to create, transform and attest VEX metadata☆164Updated last week
- Scan GitHub Actions Workflow logs for IOCs☆15Updated last month
- Runtime Security Solution for your CI/CD Pipeline☆110Updated 4 months ago
- ☆114Updated 2 months ago
- A VS Code Extension for Trivy☆150Updated 2 weeks ago
- Generate SBOMs with gh CLI☆195Updated 5 months ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆28Updated 2 years ago
- Format agnostic SBOM tooling☆119Updated 3 weeks ago
- ☆16Updated last year
- fatbom (Fat Bill Of Materials) is a tool which combines the SBOM generated by various tools into one fat SBOM. Thus leveraging each tool'…☆33Updated 3 years ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- A GitHub App that acts like a Security Token Service (STS) for the Github API☆237Updated this week
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆120Updated last month
- A BOM repository server for distributing CycloneDX BOMs☆84Updated 4 months ago
- An SBOM query language and associated utilities☆54Updated last year
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆171Updated last week
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- ☆90Updated this week
- A standard API specification for exchanging supply chain artifacts and intelligence☆90Updated last week
- Log monitor for Rekor to verify immutability and monitor entries☆37Updated last week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 10 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- ☆51Updated 3 weeks ago
- Generate a score for your sbom to understand if it will actually be useful.☆234Updated last year