Runtime security plug to protect user containers
☆67Mar 20, 2026Updated this week
Alternatives and similar repositories for security-guard
Users that are interested in security-guard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kilt is a project that defines how to inject foreign apps into containers☆13Dec 15, 2023Updated 2 years ago
- iterating over YAML!☆13Feb 9, 2026Updated last month
- A static code analyzer to generate network connection topology for micro-service applications☆18Mar 16, 2026Updated last week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- Production grade Kubernetes controller for managing AWS Services using CRDs☆16Apr 8, 2020Updated 5 years ago
- Export your Xray Traces and forward them to an OTEL collector☆19Jun 27, 2022Updated 3 years ago
- ☆22Mar 5, 2026Updated 2 weeks ago
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- An query language and interactive tooling to work with SBOM data.☆15Oct 7, 2024Updated last year
- 🔮 ✈️ to integrate OPA Gatekeeper's new ExternalData feature with cosign to determine whether the images are valid by verifying their sig…☆79Dec 4, 2025Updated 3 months ago
- ☆14Sep 20, 2023Updated 2 years ago
- sigstore the hard way!☆118Aug 6, 2025Updated 7 months ago
- A place for policy work group related proposals and prototypes.☆65May 21, 2025Updated 10 months ago
- [GitHub] A Command Line ToolKit for GitHub Security Alert.☆28Jan 21, 2026Updated 2 months ago
- Archived: Use github.com/stolostron/gatekeeper-operator☆39Sep 26, 2023Updated 2 years ago
- Generate Software Bill of Materials (SBOM) from virtual machine disk images, without booting the VM.☆17Feb 20, 2026Updated last month
- vexctl is a tool to attest VEX impact statements☆45Mar 27, 2023Updated 2 years ago
- ☆55Dec 18, 2023Updated 2 years ago
- Python module that generates token to authenticate against a Kubernetes EKS Cluster☆12Jul 8, 2018Updated 7 years ago
- ☆32Dec 1, 2019Updated 6 years ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Dec 21, 2022Updated 3 years ago
- debug IAM roles for service accounts☆65Updated this week
- OpenClarity is an open source platform built to enhance security and observability of cloud native applications and infrastructure☆1,453Mar 16, 2026Updated last week
- SLSA level 3 action☆11Apr 26, 2024Updated last year
- Kiali operator that is used to install, manage, and update Kiali deployments.☆90Updated this week
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,372Feb 3, 2026Updated last month
- ☆73May 13, 2025Updated 10 months ago
- Generate a score for your sbom to understand if it will actually be useful.☆239Aug 13, 2024Updated last year
- Clean That Cloud!☆19Feb 25, 2021Updated 5 years ago
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆202Jul 28, 2021Updated 4 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Mar 21, 2025Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- Cedar for Kubernetes brings the power of Cedar to Kubernetes authorization and admission validation, showing how cluster administrators c…☆139Nov 20, 2025Updated 4 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- Mobile Growth SDK: Notifications, Revenue Growth, Increase App Ratings, Feature Flags, In-App Messaging and User Targeting☆61Apr 15, 2025Updated 11 months ago
- Artifact Ratification Framework (CNCF Sandbox)☆287Mar 5, 2026Updated 2 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆113Jan 2, 2025Updated last year