Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations, and compliance violations across your Kubernetes clusters, manifests, and CI/CD pipelines.
☆76Sep 13, 2025Updated 7 months ago
Alternatives and similar repositories for spotter
Users that are interested in spotter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆96Updated this week
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 4 months ago
- Data about all known supply-chain attacks through history☆65May 28, 2025Updated 10 months ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 6 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆18Feb 2, 2026Updated 2 months ago
- ☆17Jul 12, 2019Updated 6 years ago
- ☆39Jul 31, 2025Updated 8 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Mar 26, 2026Updated 3 weeks ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆48Apr 10, 2026Updated last week
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 11 months ago
- ☆18Jul 30, 2024Updated last year
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 11 months ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 4 months ago
- Jenkins Plugin for Sysdig Secure☆14Apr 1, 2026Updated 2 weeks ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 10 months ago
- ☆14Apr 23, 2019Updated 6 years ago
- ☆19Jan 31, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆52Mar 28, 2026Updated 3 weeks ago
- ☆44Jul 17, 2025Updated 9 months ago
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆25Feb 22, 2026Updated last month
- ☆34Oct 24, 2025Updated 5 months ago
- ☆69Jul 18, 2025Updated 9 months ago
- ☆52Dec 20, 2025Updated 3 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 3 months ago
- A GitHub action that allows users to subscribe to a label and automatically get @'d when the label is applied☆12Jul 18, 2023Updated 2 years ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆29Jul 11, 2025Updated 9 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated 2 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- ☆14Jun 28, 2017Updated 8 years ago