grafana / bugbountyLinks
Grafana Labs bug bounty
☆30Updated last year
Alternatives and similar repositories for bugbounty
Users that are interested in bugbounty are comparing it to the libraries listed below
Sorting:
- ☆103Updated last month
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆162Updated last month
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆176Updated 11 months ago
- a tool to audit the istio service mesh☆173Updated 4 years ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testing☆474Updated 2 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- OWASP Kubernetes security and compliance tool [WIP]☆108Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆120Updated 2 years ago
- tool for checking potential dependency confusion☆36Updated 6 months ago
- Scans your Github Actions for security issues☆89Updated 2 weeks ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆180Updated 2 weeks ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Updated 4 years ago
- 🧰 Multi Tool Kubernetes Pentest Image☆251Updated 4 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated this week
- Tools to assess DNS security.☆153Updated last year
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆241Updated last month
- Dynamic Application and API Security Testing☆193Updated 2 years ago
- Cloud agnostic IAM permissions enumerator☆161Updated 9 months ago
- Kubernetes Pwnage for all☆56Updated 5 years ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆195Updated 3 months ago
- Protect against subdomain takeover☆95Updated 5 months ago
- Measures the effectiveness of your Web Application Firewall (WAF)☆82Updated 6 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated 3 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- book website☆72Updated 3 years ago
- ☆31Updated 2 years ago
- A utility to (re-)import findings and language data into DefectDojo☆43Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year