ecomtech-oss / piscLinks
Public OCI-Image (docker image) Security Checker
☆18Updated 5 months ago
Alternatives and similar repositories for pisc
Users that are interested in pisc are comparing it to the libraries listed below
Sorting:
- DevSecOps Assessment Framework☆118Updated 2 months ago
- It's my solution for bugbounty automation☆20Updated 7 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆250Updated 3 months ago
- Jet Container Security Framework (JCSF)☆55Updated 5 months ago
- Secrets scanner that understands code☆191Updated 2 years ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆176Updated 10 months ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆39Updated last year
- SneakPeeker is a tool for finding and removing Canary tokens.☆14Updated 11 months ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆47Updated last year
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆177Updated 2 weeks ago
- Check bitrix vulnerabilities☆88Updated last year
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆38Updated 3 years ago
- tool for checking potential dependency confusion☆35Updated 5 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆190Updated 3 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 10 months ago
- Awesome DevSecOps на русском языке☆323Updated 2 years ago
- Secrets scanner that understands code☆163Updated last week
- A monster cheatsheet on MITM attacks☆367Updated 6 months ago
- ⛅️🔐 Security Requirements for Yandex.Cloud configuration: IAM, network access, key management, Kubernetes, audit logs.☆41Updated 4 years ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆60Updated 6 months ago
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆50Updated 2 months ago
- Репозиторий с материалами для развития в Bug Bounty☆11Updated 2 years ago
- Modern web-based distributed hashcracking solution, built on hashcat☆186Updated this week
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- Finding secrets in various (non-text) popular files.☆51Updated last month
- ☆42Updated 2 years ago
- Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)☆94Updated 5 years ago
- System of Orchestration, Lifecycle control, Detection and Response☆61Updated last year