dynatrace-oss / invadiumLinks
Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.
☆11Updated 2 years ago
Alternatives and similar repositories for invadium
Users that are interested in invadium are comparing it to the libraries listed below
Sorting:
- Unguard is an insecure cloud-native microservices demo application.☆50Updated last week
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆24Updated last week
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆331Updated 2 years ago
- A reading list for software supply-chain security.☆365Updated 2 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆815Updated 6 months ago
- Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure usin…☆1,079Updated this week
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,412Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆384Updated this week
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆372Updated last week
- Open Source Package Analysis☆851Updated 6 months ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆27Updated 8 months ago
- ☆250Updated last week
- Agile Threat Modeling Toolkit☆703Updated last month
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated 3 weeks ago
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆215Updated 4 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆244Updated this week
- ☆13Updated 2 years ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆397Updated 2 years ago
- A curated list of SBOM (Software Bill Of Materials) related tools, frameworks, blogs, podcasts, and articles☆542Updated 5 months ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆497Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 6 months ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆843Updated this week
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆724Updated last month
- Tool for building Kubernetes attack paths☆916Updated 2 weeks ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆549Updated last month
- Collection of tools for analyzing open source packages.☆349Updated last month
- GitHub Actions Pipeline Enumeration and Attack Tool☆710Updated last month
- Home page of project "KB"☆129Updated 6 months ago
- A toolset for dealing with Cryptography Bill of Materials (CBOM)☆48Updated this week
- in-toto is a framework to protect supply chain integrity.☆951Updated last week