cr0hn / dockerfile-securityLinks
Static security checker for Dockerfiles
☆95Updated last year
Alternatives and similar repositories for dockerfile-security
Users that are interested in dockerfile-security are comparing it to the libraries listed below
Sorting:
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.☆112Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 3 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Updated last year
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- ☆41Updated 4 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆129Updated 2 months ago
- ☆18Updated 5 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Updated 5 years ago
- ☆114Updated 2 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- Holds the public Hacking the Cloud CTFs.☆63Updated last year
- A curated list of security tools for Hackers & Builders!☆98Updated last year
- Dependency Combobulator☆95Updated 2 years ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 6 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Updated last year
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆163Updated 4 years ago
- AWS Security Checks☆40Updated 8 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Updated 3 years ago