gunjan5 / container-securityLinks
Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides
☆68Updated 4 years ago
Alternatives and similar repositories for container-security
Users that are interested in container-security are comparing it to the libraries listed below
Sorting:
- Awesome resources about Security in Kubernetes☆43Updated 2 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆106Updated 7 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆69Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- ☆10Updated 3 years ago
- book website☆70Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- OWASP Foundation Web Respository☆55Updated 2 years ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 5 months ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- ☆249Updated 9 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- ☆179Updated 2 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- A deliberately vulnerable Kubernetes cluster☆126Updated last year
- OWASP Kubernetes Security Testing Guide☆38Updated 9 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 8 months ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Updated 3 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 10 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated 2 weeks ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- A collection of DevSecOps reference architectures☆68Updated 4 years ago
- ☆98Updated 4 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆108Updated 7 months ago
- Labs for Threat Modelling training delivered by ControlPlane☆31Updated last year