chainguard-dev / malcontent
#supply #chain #attack #detection
☆501Updated this week
Alternatives and similar repositories for malcontent:
Users that are interested in malcontent are comparing it to the libraries listed below
- Validate the isolation posture of your container environment.☆245Updated this week
- A security layer for Git repositories☆493Updated this week
- OpenVEX Specification☆141Updated 7 months ago
- boostsecurityio/poutine☆254Updated last week
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆424Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆290Updated this week
- Format agnostic SBOM tooling☆100Updated this week
- A repo to conduct vulnerability enrichment.☆570Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆270Updated 2 weeks ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆373Updated last year
- A tool for preventing the installation of malicious PyPI and npm packages☆124Updated last week
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆356Updated this week
- Linux Process Discovery. C Library, Go bindings, Runtime.☆219Updated 2 years ago
- An open-source collection of API key rotation tutorials.☆63Updated 2 months ago
- Production-ready detection & response queries for osquery☆543Updated this week
- Kubernetes focused container assessment and context discovery tool for penetration testing☆448Updated 8 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆584Updated this week
- Tool for building Kubernetes attack paths☆818Updated last week
- Documenting your Threat Models with HCL☆421Updated 5 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆223Updated 5 months ago
- Enrich SBOMs with data from third party services☆158Updated last week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated last year
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- Sigstore OIDC PKI☆680Updated this week
- A tool to create, transform and attest VEX metadata☆129Updated this week
- ☆232Updated this week
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆273Updated 5 months ago
- ☆175Updated 3 months ago
- A reading list for software supply-chain security.☆361Updated 2 years ago
- Verify provenance from SLSA compliant builders☆245Updated last week