edera-dev / am-i-isolated
Validate the isolation posture of your container environment.
☆277Updated this week
Alternatives and similar repositories for am-i-isolated
Users that are interested in am-i-isolated are comparing it to the libraries listed below
Sorting:
- boostsecurityio/poutine☆267Updated last week
- A tool for preventing the installation of malicious PyPI and npm packages☆143Updated last week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆84Updated 4 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆278Updated 3 months ago
- ☆72Updated this week
- 🧰 Multi Tool Kubernetes Pentest Image☆230Updated last month
- ☆177Updated 3 weeks ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Updated 10 months ago
- ☆182Updated last month
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆438Updated 2 weeks ago
- boostsecurityio/lotp☆125Updated last month
- ☆64Updated 3 months ago
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆133Updated this week
- Runtime Security Solution for your CI/CD Pipeline☆102Updated last month
- Inspect certificate authorities in container images☆234Updated last week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆149Updated 5 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆54Updated 3 months ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆472Updated this week
- Format agnostic SBOM tooling☆106Updated this week
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆138Updated last month
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆112Updated last week
- Gram is Klarna's own threat model diagramming tool☆320Updated 2 weeks ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- KBOM - Kubernetes Bill of Materials☆315Updated last month
- A universal SBOM representation in protocol buffers☆283Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆133Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆140Updated 4 months ago
- Prevent merging of malicious code in pull requests☆222Updated last month