dynatrace-oss / invadiumLinks
Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.
☆11Updated 2 years ago
Alternatives and similar repositories for invadium
Users that are interested in invadium are comparing it to the libraries listed below
Sorting:
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆29Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆404Updated 2 years ago
- A reading list for software supply-chain security.☆366Updated 3 years ago
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆342Updated 2 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆442Updated this week
- Constellation is a Kubernetes distribution for confidential computing, securing entire clusters on untrusted infrastructure. Constellati…☆1,101Updated last week
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆381Updated 2 weeks ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Updated 3 weeks ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆300Updated this week
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆827Updated 10 months ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆767Updated last year
- Tool for building Kubernetes attack paths☆934Updated 2 weeks ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆596Updated 10 months ago
- App that simplifies building decision trees to model adverse scenarios☆224Updated last year
- #supply #chain #attack #detection☆640Updated this week
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Updated 7 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated 2 years ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆960Updated this week
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆28Updated last year
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆223Updated 8 months ago
- Unguard is an insecure cloud-native microservices demo application.☆60Updated this week
- A standard API specification for exchanging supply chain artifacts and intelligence☆97Updated last week
- GitHub Actions Pipeline Enumeration and Attack Tool☆722Updated 4 months ago
- Agile Threat Modeling Toolkit☆721Updated 2 months ago
- This repository contains a SonarQube Plugin that detects cryptographic assets in source code and generates CBOM.☆54Updated last week
- ☆254Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated 3 weeks ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- A curated list of SBOM (Software Bill Of Materials) related tools, frameworks, blogs, podcasts, and articles☆563Updated 8 months ago
- Open Source Package Analysis☆862Updated 9 months ago