listendev / actionLinks
Proactive security monitoring and threat detection in CI/CD
☆15Updated 8 months ago
Alternatives and similar repositories for action
Users that are interested in action are comparing it to the libraries listed below
Sorting:
- Jibril: A performant and low impact Linux runtime security tool agent.☆14Updated 8 months ago
- Runtime Security Solution for your CI/CD Pipeline☆111Updated last week
- Intent driven security automation framework☆26Updated 5 months ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆50Updated 3 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Demo repository for running eBPF in GitHub Actions☆23Updated 10 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Updated last year
- Publications from the eBPF foundation☆28Updated last month
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Updated 2 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Updated 2 years ago
- A tool to render a pie chart of memory usage (bytes_memlock) of BPF maps on the system 🥧☆21Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated 4 months ago
- ☆86Updated 3 weeks ago
- An SBOM query language and associated utilities☆55Updated 2 years ago
- Runtime detection and response for malicious events in Kubernetes workloads☆46Updated last year
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆29Updated this week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- A tool to create, transform and attest VEX metadata☆172Updated this week
- ☆74Updated last month
- ☆73Updated 8 months ago
- ☆28Updated 8 months ago
- Format agnostic SBOM tooling☆131Updated 2 months ago
- Log monitor for Rekor to verify immutability and monitor entries☆45Updated this week
- Security advisory data for Wolfi☆20Updated 3 weeks ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆43Updated 3 weeks ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆74Updated 9 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆214Updated this week
- Falco plugins registry☆112Updated this week
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- Evolution process of The Falco Project☆59Updated this week