argonsecurity / pipeline-parser
☆14Updated 8 months ago
Alternatives and similar repositories for pipeline-parser:
Users that are interested in pipeline-parser are comparing it to the libraries listed below
- ☆19Updated 2 years ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆741Updated 3 months ago
- ☆175Updated 4 months ago
- Container image with malware and crypto miner for testing purposes☆43Updated this week
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆164Updated 10 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆78Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆132Updated last year
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆273Updated 6 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Utility that provides an API platform for validating, querying and managing BOM data☆104Updated 4 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆146Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆174Updated this week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆88Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆297Updated this week
- Documenting your Threat Models with HCL☆425Updated 6 months ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆74Updated last week
- ☆112Updated 2 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆80Updated 2 months ago
- Runtime Security Solution for your CI/CD Pipeline☆99Updated last week
- A full insecure kubernetes application for testing security tools☆70Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆376Updated last year
- ☆37Updated 3 weeks ago
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and git☆89Updated this week
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆111Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆72Updated 10 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 9 months ago
- One Conference 2024☆108Updated 5 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆174Updated 6 months ago