gunjan5 / container-security
Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides
☆67Updated 4 years ago
Alternatives and similar repositories for container-security:
Users that are interested in container-security are comparing it to the libraries listed below
- Awesome resources about Security in Kubernetes☆42Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- ☆93Updated last month
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated 3 weeks ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- ☆175Updated 4 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆182Updated 6 months ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 5 months ago
- OWASP Kubernetes Security Testing Guide☆37Updated 6 months ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆59Updated 2 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆69Updated 2 years ago
- A full insecure kubernetes application for testing security tools☆70Updated this week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- ☆10Updated 2 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 9 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Protect against subdomain takeover☆93Updated 10 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- ☆239Updated 6 months ago
- ☆110Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- ☆44Updated 3 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆124Updated 11 months ago
- OWASP Foundation Web Respository☆55Updated last year