Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations, and compliance violations across your Kubernetes clusters, manifests, and CI/CD pipelines.
☆74Sep 13, 2025Updated 6 months ago
Alternatives and similar repositories for spotter
Users that are interested in spotter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆96Aug 3, 2025Updated 7 months ago
- MCP Bridge is a lightweight, fast, and LLM-agnostic proxy for connecting to multiple Model Context Protocol (MCP) servers through a unifi…☆61Jul 7, 2025Updated 8 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 4 months ago
- ☆10Aug 11, 2025Updated 7 months ago
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 5 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Feb 23, 2026Updated last month
- ☆18Feb 2, 2026Updated last month
- ☆39Jul 31, 2025Updated 7 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated 11 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆122Jan 30, 2026Updated last month
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated this week
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 10 months ago
- ☆18Jul 30, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 10 months ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- ☆19Jan 31, 2025Updated last year
- ☆52Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆18Sep 13, 2021Updated 4 years ago
- ☆69Jul 18, 2025Updated 8 months ago
- ☆52Dec 20, 2025Updated 3 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- A GitHub action that allows users to subscribe to a label and automatically get @'d when the label is applied☆12Jul 18, 2023Updated 2 years ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆28Jul 11, 2025Updated 8 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- sbt bom.xml exporter☆36Updated this week