dynatrace-oss / invadiumLinks
Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.
☆11Updated 2 years ago
Alternatives and similar repositories for invadium
Users that are interested in invadium are comparing it to the libraries listed below
Sorting:
- Unguard is an insecure cloud-native microservices demo application.☆52Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆383Updated last year
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Updated 2 months ago
- Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotat…☆40Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 6 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆285Updated 9 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆35Updated 3 months ago
- Tool for building Kubernetes attack paths☆880Updated 2 weeks ago
- ☆236Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆280Updated 4 months ago
- ☆96Updated 4 months ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆25Updated 4 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆310Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆345Updated 2 months ago
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆208Updated last week
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆359Updated 5 months ago
- SysFlow edge processing pipeline☆16Updated 4 months ago
- One Conference 2024☆110Updated 8 months ago
- A reading list for software supply-chain security.☆364Updated 2 years ago
- 🧰 Multi Tool Kubernetes Pentest Image☆233Updated last month
- Monthly CVE Stats☆42Updated last month
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆287Updated this week
- A full insecure kubernetes application for testing security tools☆87Updated last month
- pySigma backend for generating Grafana Loki/LogQL rules☆45Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆36Updated last week
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆115Updated 3 weeks ago
- Response Engine for managing threats in your Kubernetes☆160Updated this week