google / container-explorerLinks
☆88Updated 3 weeks ago
Alternatives and similar repositories for container-explorer
Users that are interested in container-explorer are comparing it to the libraries listed below
Sorting:
- ☆113Updated this week
- ☆73Updated this week
- Automated testing, generation & manipulation of #osquery packs☆73Updated 8 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆100Updated 5 months ago
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆44Updated last year
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- ☆74Updated last month
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆57Updated 11 months ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆45Updated this week
- ☆40Updated last month
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- Microsoft Defender for Cloud threat matrix for Kubernetes☆25Updated 2 years ago
- ☆20Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 4 months ago
- ☆30Updated last week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 8 months ago
- A tool to create, transform and attest VEX metadata☆140Updated this week
- An SBOM query language and associated utilities☆54Updated last year
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Runtime Security Solution for your CI/CD Pipeline☆104Updated last week
- Compares and analyzes GCP IAM roles.☆77Updated 3 months ago
- Cloud Security Posture security policies☆31Updated 9 months ago
- ☆52Updated this week
- Kubernetes audit logging, when you don't control the control plane☆81Updated this week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- ☆54Updated 2 weeks ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year