omerlh / zap-operator
☆21Updated 5 years ago
Alternatives and similar repositories for zap-operator:
Users that are interested in zap-operator are comparing it to the libraries listed below
- A Security Scanner for Go☆26Updated 6 years ago
- ☆27Updated 3 months ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- Externalize Java application access to protected resources as log messages.☆40Updated 9 months ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 6 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- ☆25Updated 3 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- ☆28Updated 4 years ago
- ☆20Updated 6 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Updated 5 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- A tool to investigate Dependency Confusion in Artifactory☆23Updated last year
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Kubernetes Easter CTF☆58Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- ZAP Management Scripts☆23Updated this week
- AppSecPipeline Specification for DevOps automation.☆39Updated 2 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- DEF CON 26 WorkShop - Fuzzing FTW☆19Updated 6 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆19Updated 4 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 5 years ago
- javaspringvulny - a Spring Boot web application built wrong on purpose☆19Updated 2 weeks ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 10 years ago