dynatrace-oss / invadiumLinks
Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.
☆11Updated 2 years ago
Alternatives and similar repositories for invadium
Users that are interested in invadium are comparing it to the libraries listed below
Sorting:
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆337Updated 2 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆819Updated 8 months ago
- Unguard is an insecure cloud-native microservices demo application.☆54Updated last week
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Updated 5 months ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆26Updated last month
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆764Updated 11 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆288Updated last year
- A reading list for software supply-chain security.☆366Updated 3 years ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆28Updated 10 months ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆590Updated 8 months ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆376Updated this week
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,420Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆414Updated this week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆255Updated last week
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆299Updated this week
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆218Updated 6 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 6 months ago
- #supply #chain #attack #detection☆566Updated last week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 8 months ago
- Tool for building Kubernetes attack paths☆925Updated last week
- Open Source Package Analysis☆857Updated 7 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated last year
- App that simplifies building decision trees to model adverse scenarios☆220Updated last year
- Cumulus. Threat modeling the Clouds.☆40Updated last month
- A curated list of SBOM (Software Bill Of Materials) related tools, frameworks, blogs, podcasts, and articles☆546Updated 6 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆397Updated 2 years ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆714Updated 2 months ago
- OSCAL and Kyverno Policy Demo for AWS☆15Updated 2 years ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆483Updated 5 months ago