google / gke-auditor
☆74Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for gke-auditor
- Security scanning & static analysis tool☆93Updated 3 weeks ago
- ☆61Updated last year
- GCP CSPM using Google Sheets☆34Updated 5 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆92Updated 5 years ago
- Kubernetes Pwnage for all☆54Updated 3 years ago
- ☆36Updated 3 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated last year
- ☆21Updated 4 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 4 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆53Updated 2 months ago
- A zero-dependency tool for finding secrets in directories☆10Updated 3 years ago
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆38Updated 3 years ago
- ☆27Updated last week
- ☆57Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆79Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆71Updated 3 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- ☆48Updated 4 years ago
- ☆28Updated 4 years ago
- Kubernetes Easter CTF☆58Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- ☆20Updated 6 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆62Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆61Updated last year
- OWASP Kubernetes Security Testing Guide☆37Updated 2 months ago