Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"
☆67Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for malicious-compliance
Users that are interested in malicious-compliance are comparing it to the libraries listed below
Sorting:
- ☆37Apr 23, 2024Updated last year
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated 10 months ago
- ☆22Jul 24, 2025Updated 7 months ago
- Collection of tools for producing and exploring OmniBOR data.☆22Oct 31, 2024Updated last year
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆41Nov 16, 2025Updated 4 months ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Mar 9, 2026Updated last week
- Explanation on what a CRI (Container Runtime Interface) is and how to write it from scratch.☆33Sep 15, 2024Updated last year
- ☆14Sep 20, 2023Updated 2 years ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Apr 17, 2023Updated 2 years ago
- Scans SBOMs for vulnerabilities with Grype☆85Updated this week
- OCI images for the curious.☆12Mar 21, 2022Updated 3 years ago
- ☆14May 6, 2015Updated 10 years ago
- Repository for install ACS as GitOps☆10Jan 24, 2023Updated 3 years ago
- ☆86Feb 4, 2026Updated last month
- KeyCloak Extensions: Securing Realm Resources With Custom Roles☆15Aug 29, 2016Updated 9 years ago
- Website and API for OpenSSF Scorecard☆28Mar 9, 2026Updated last week
- ☆32Dec 30, 2023Updated 2 years ago
- This repository demonstrate how to use component model with wasmtime.☆11Jul 16, 2024Updated last year
- A repository to host all the different vagrant setups that I use.☆10Jun 14, 2022Updated 3 years ago
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Sep 26, 2023Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Docker Desktop Extension for Trivy☆26Feb 14, 2026Updated last month
- ☆53Mar 25, 2025Updated 11 months ago
- IPsec overlay network manager☆16Aug 9, 2017Updated 8 years ago
- Docker image to run TeamViewer☆13Oct 4, 2021Updated 4 years ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆27Dec 17, 2024Updated last year
- Notes on various topics of RHEL System Administration.☆16Mar 10, 2025Updated last year
- Sigstore user stories☆31Aug 25, 2023Updated 2 years ago
- ☆108Nov 15, 2025Updated 4 months ago
- AWS Cloudtrail event alerting lambda function. Send alerts to Slack, Email, or SNS.☆20Apr 13, 2023Updated 2 years ago
- Advanced Cluster Security for Kubernetes tutorial☆14Apr 22, 2024Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- ☆20Feb 5, 2026Updated last month
- ☆11Jan 13, 2023Updated 3 years ago
- #supply #chain #attack #detection☆646Updated this week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 3 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year