madhuakula / spotterView external linksLinks
Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations, and compliance violations across your Kubernetes clusters, manifests, and CI/CD pipelines.
☆70Sep 13, 2025Updated 5 months ago
Alternatives and similar repositories for spotter
Users that are interested in spotter are comparing it to the libraries listed below
Sorting:
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Nov 27, 2025Updated 2 months ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 8 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆10Aug 11, 2025Updated 6 months ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- ☆96Aug 3, 2025Updated 6 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- MCP Bridge is a lightweight, fast, and LLM-agnostic proxy for connecting to multiple Model Context Protocol (MCP) servers through a unifi…☆55Jul 7, 2025Updated 7 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Dec 9, 2025Updated 2 months ago
- ☆18Jul 30, 2024Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- ☆14Apr 23, 2019Updated 6 years ago
- ☆18Feb 2, 2026Updated last week
- ☆38Jul 31, 2025Updated 6 months ago
- ☆14Jun 28, 2017Updated 8 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last week
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 9 months ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- ☆69Jul 18, 2025Updated 6 months ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Identity Access Management (IAM) Proxy☆21Apr 23, 2025Updated 9 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Oct 3, 2024Updated last year
- A smali emulator.☆25Jun 27, 2018Updated 7 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆41Sep 16, 2025Updated 4 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Feb 8, 2026Updated last week
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Nov 26, 2025Updated 2 months ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 2 years ago