gojek / dollhouseLinks
☆61Updated 4 years ago
Alternatives and similar repositories for dollhouse
Users that are interested in dollhouse are comparing it to the libraries listed below
Sorting:
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 5 years ago
- Anteater - CI/CD Gate Check Framework☆176Updated 2 years ago
- ☆74Updated 5 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- A Security Scanner for Go☆26Updated 6 years ago
- Lab Material for the Two-Day Defending Modern DevOps Environments Course☆125Updated 5 years ago
- Security scanning & static analysis tool☆93Updated last year
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- Kubernetes Easter CTF☆59Updated 5 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆86Updated 4 years ago
- Google Cloud Platform Security Tool☆234Updated 6 years ago
- A collection of public security audits.☆208Updated 5 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- AWS Red Team Orchestration Framework☆102Updated 8 years ago
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 6 months ago
- Assorted tools for security-related task for git repositories☆59Updated 3 years ago
- One slackbot to rule them all☆86Updated 3 months ago
- A Dockerfile that creates an image with known vulnerabilities.☆50Updated 3 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆103Updated 6 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆127Updated 3 weeks ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Updated 3 years ago
- ☆29Updated 9 months ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Monitors Github for leaked secrets☆202Updated last year