Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations, and compliance violations across your Kubernetes clusters, manifests, and CI/CD pipelines.
☆71Sep 13, 2025Updated 5 months ago
Alternatives and similar repositories for spotter
Users that are interested in spotter are comparing it to the libraries listed below
Sorting:
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆10Aug 11, 2025Updated 6 months ago
- ☆96Aug 3, 2025Updated 7 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- MCP Bridge is a lightweight, fast, and LLM-agnostic proxy for connecting to multiple Model Context Protocol (MCP) servers through a unifi…☆57Jul 7, 2025Updated 8 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Dec 9, 2025Updated 3 months ago
- ☆18Jul 30, 2024Updated last year
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- ☆14Apr 23, 2019Updated 6 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- ☆18Feb 2, 2026Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last week
- ☆39Jul 31, 2025Updated 7 months ago
- ☆69Jul 18, 2025Updated 7 months ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Identity Access Management (IAM) Proxy☆21Apr 23, 2025Updated 10 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- ☆21Sep 25, 2018Updated 7 years ago
- A smali emulator.☆24Jun 27, 2018Updated 7 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 5 months ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- ☆11Feb 9, 2023Updated 3 years ago