google / container-explorer
☆86Updated last month
Alternatives and similar repositories for container-explorer:
Users that are interested in container-explorer are comparing it to the libraries listed below
- ☆112Updated 3 months ago
- Automated testing, generation & manipulation of #osquery packs☆72Updated 6 months ago
- ☆72Updated 3 months ago
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆40Updated last year
- ☆20Updated last year
- Kubernetes audit logging, when you don't control the control plane☆74Updated this week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆52Updated 10 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 4 months ago
- ☆25Updated last year
- TACOS framework structural details☆20Updated last year
- ☆74Updated 2 weeks ago
- An SBOM query language and associated utilities☆54Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated last month
- Helm charts for running open source digital forensic tools in Kubernetes☆94Updated this week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago
- ☆11Updated 3 months ago
- ☆19Updated last month
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Common code for hardening benchmarks☆11Updated last year
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- A tool to create, transform and attest VEX metadata☆134Updated last week
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- ☆51Updated this week
- A tool for preventing the installation of malicious PyPI and npm packages☆140Updated this week