edera-dev / am-i-isolated
Validate the isolation posture of your container environment.
☆232Updated this week
Alternatives and similar repositories for am-i-isolated:
Users that are interested in am-i-isolated are comparing it to the libraries listed below
- boostsecurityio/poutine☆244Updated 3 weeks ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆82Updated this week
- A tool for preventing the installation of malicious PyPI and npm packages☆114Updated last month
- 🧰 Multi Tool Kubernetes Pentest Image☆220Updated 5 months ago
- ☆161Updated 4 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated 6 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆77Updated 3 weeks ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆144Updated 2 months ago
- ☆171Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆134Updated 3 weeks ago
- Gram is Klarna's own threat model diagramming tool☆317Updated last week
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- ☆46Updated this week
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆113Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆266Updated 2 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆36Updated 5 months ago
- Semgrep-based Policy Controller for Kubernetes☆45Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆50Updated this week
- Generate datasets of cloud audit logs for common attacks☆195Updated 5 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆51Updated last year
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆205Updated 2 months ago
- Inspect certificate authorities in container images☆229Updated 8 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated 9 months ago
- AWS honey token manager☆87Updated 5 months ago
- ☆111Updated 3 weeks ago
- Security tool against dependency typosquatting attacks☆39Updated this week
- Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams☆41Updated 2 weeks ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆141Updated 7 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year