blackberry / UBCISLinks
Ultimate Benchmark for Container Image Scanners
☆13Updated 5 years ago
Alternatives and similar repositories for UBCIS
Users that are interested in UBCIS are comparing it to the libraries listed below
Sorting:
- ☆106Updated 2 months ago
- ☆29Updated last year
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆163Updated 2 months ago
- ☆45Updated 9 months ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆25Updated 4 years ago
- a tool to audit the istio service mesh☆174Updated 4 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆101Updated 5 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆97Updated last year
- Kubernetes Pwnage for all☆57Updated 5 years ago
- Build custom Docker seccomp profiles for containers by finding syscalls it uses.☆91Updated 3 months ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- SysFlow documentation and issues tracker☆46Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Updated 2 years ago
- Docker Secure Computing Profile Generator☆49Updated 4 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆74Updated 3 years ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆181Updated last month
- ☆27Updated 4 months ago
- Security Alert Decoration☆27Updated 6 months ago
- ☆86Updated last week
- A tool to check the security settings of Github Organizations.☆75Updated this week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated 2 years ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆115Updated 8 months ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated last week
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Static Analysis Library for Containers☆197Updated 2 years ago
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Updated 3 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year