dynatrace-oss / invadiumLinks
Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.
☆11Updated 2 years ago
Alternatives and similar repositories for invadium
Users that are interested in invadium are comparing it to the libraries listed below
Sorting:
- Tool for building Kubernetes attack paths☆893Updated 3 weeks ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Updated 3 weeks ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆461Updated last year
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,381Updated this week
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆326Updated 2 years ago
- Collection of tools for analyzing open source packages.☆346Updated last week
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆365Updated 7 months ago
- A reading list for software supply-chain security.☆363Updated 2 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆318Updated this week
- OWASP Foundation Web Respository☆587Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆385Updated last year
- Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure usin…☆1,056Updated this week
- GitGuardian Canary Tokens☆137Updated 2 weeks ago
- Unguard is an insecure cloud-native microservices demo application.☆52Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆346Updated 3 months ago
- A curated list of SBOM (Software Bill Of Materials) related tools, frameworks, blogs, podcasts, and articles☆534Updated last month
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆532Updated 5 months ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆700Updated last month
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆751Updated 7 months ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆489Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆330Updated 2 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆814Updated 3 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆39Updated 5 months ago
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆945Updated this week
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆762Updated this week
- This repository contains a SonarQube Plugin that detects cryptographic assets in source code and generates CBOM.☆35Updated last week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆212Updated this week
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆477Updated 3 weeks ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆571Updated 3 months ago