madhuakula / spotterLinks
Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations, and compliance violations across your Kubernetes clusters, manifests, and CI/CD pipelines.
☆28Updated last week
Alternatives and similar repositories for spotter
Users that are interested in spotter are comparing it to the libraries listed below
Sorting:
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 7 months ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆60Updated 2 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- ☆15Updated 3 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 11 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Updated last month
- Scan your account for the use of untrusted AMIs☆29Updated last month
- Automated vulnerability discovery and annotation☆67Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- ☆31Updated 4 years ago
- Dusseldorf is an out-of-band security tool to help in security research.☆38Updated 2 weeks ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆105Updated 6 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆33Updated last month
- egrets monitors egress☆46Updated 5 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated 10 months ago
- ☆12Updated 3 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 3 months ago
- Kubernetes Unhinged Shell 😎☆46Updated 2 years ago
- ☆18Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 9 months ago