k1LoW / trivy-db-to
trivy-db-to is a tool for migrating/converting vulnerability information from Trivy DB to other datasource.
☆27Updated 6 months ago
Alternatives and similar repositories for trivy-db-to:
Users that are interested in trivy-db-to are comparing it to the libraries listed below
- RPM DB bindings for go☆62Updated last week
- Static Analysis Library for Containers☆198Updated last year
- Kubernetes CTF☆43Updated 4 years ago
- ☆183Updated this week
- Zero trust proxy for using in corporate☆71Updated 3 months ago
- bouheki is KRSI(eBPF+LSM) based Linux security auditing tool.☆88Updated 2 years ago
- Trivy based vulnerability management service☆55Updated last month
- Build a local copy of OVAL. Server mode for easy querying.☆91Updated this week
- Tracing security events in container with BPF☆15Updated last year
- Dependency Parser for Multiple Programming Languages☆148Updated 11 months ago
- silence negligible CVE alerts using LLM☆42Updated this week
- A Go library for CPE (A Common Platform Enumeration 2.3)☆37Updated last year
- Kilt is a project that defines how to inject foreign apps into containers☆13Updated last year
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆23Updated this week
- GitHub Issue + Trivy Action☆55Updated 2 years ago
- Trivy's misconfiguration scanning engine☆218Updated 3 months ago
- Protect GitHub Actions with Tracee☆81Updated 3 months ago
- [PoC] A socket-based tracing system for discovering network service dependencies. (renamed from transtracer)☆55Updated this week
- Go library using eBPF to trace network flow events☆35Updated 4 years ago
- A Go library for parsing and verifying versions and version constraints.☆44Updated this week
- A K8s ClusterIP HTTP monitoring library based on eBPF☆19Updated 3 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- ☆265Updated last week
- General GitHub event notification tool to Slack with Open Policy Agent and Rego☆21Updated 3 weeks ago
- ☆25Updated last year
- Scalable security network sensor as low interaction honeypot☆16Updated last year
- Tools for kubernetes pod network tapping☆42Updated 5 years ago
- agent for handling seccomp descriptors for container runtimes☆46Updated last year
- The Dirty Pipe Vulnerability☆46Updated 3 years ago
- Falco plugins registry☆94Updated this week