CI/CD plugins for image scanning, integrations with AWS ECR, Google Container Registry
☆34Jun 19, 2023Updated 2 years ago
Alternatives and similar repositories for CI-CD-Integrations
Users that are interested in CI-CD-Integrations are comparing it to the libraries listed below
Sorting:
- Front-end application for ALL the microservices☆23Jan 21, 2021Updated 5 years ago
- ☆22Jul 21, 2020Updated 5 years ago
- ThreatMapper Terraform module for AWS☆24Nov 3, 2022Updated 3 years ago
- Compliance Scripts Handler☆22Jan 8, 2026Updated last month
- Deepfence Cloud Scanner runs in your cloud environment, gathering inventory and compliance information for the assets deployed in that en…☆33Dec 3, 2024Updated last year
- Deepfence Cloud Scanner runs in your cloud environment, gathering inventory and compliance information for the assets deployed in that en…☆35Dec 3, 2024Updated last year
- ☆18May 15, 2024Updated last year
- ☆42Jan 8, 2026Updated last month
- Deepfence Cloud Scanner runs in your cloud environment, gathering inventory and compliance information for the assets deployed in that en…☆36Dec 3, 2024Updated last year
- ☆34Apr 16, 2025Updated 10 months ago
- ☆45Dec 29, 2025Updated 2 months ago
- ThreatStryker Documentation☆42Apr 16, 2025Updated 10 months ago
- Deepfence Community☆67Jan 5, 2023Updated 3 years ago
- ⛴️Docker extension for deepfence/YaraHunter🔎☆26Oct 22, 2022Updated 3 years ago
- Kubernetes Security Posture Management☆15Nov 5, 2024Updated last year
- Terraform/ Ansible configuraton to build a lab environment for trying out Deepfence Threatmapper.☆16Jun 7, 2020Updated 5 years ago
- Golang deepfence SDK☆15Dec 20, 2025Updated 2 months ago
- 🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍☆1,323Jan 8, 2026Updated last month
- ⭐ ⭐ Use ML to classify flows and packets as benign or malicious. ⭐ ⭐☆1,186Feb 19, 2025Updated last year
- Distributed tcpdump for cloud native environments☆1,928Jul 1, 2024Updated last year
- Find secrets and passwords in container images and file systems☆3,271Jan 8, 2026Updated last month
- Open Source Cloud Native Application Protection Platform (CNAPP)☆5,234Jan 8, 2026Updated last month
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- A terraform module to deploy Vault as per the reference architecture☆14Mar 19, 2019Updated 6 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Secure GitOps with continuous security observability using Deepfence ThreatMapper☆11May 13, 2021Updated 4 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- ☆12Mar 10, 2022Updated 3 years ago
- ☆10Feb 12, 2026Updated 2 weeks ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- The official Jenkins docker plus some plugins and scripts for integrating with the Gerrit.☆11Jun 21, 2019Updated 6 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago