omerlh / zap-operator
☆21Updated 5 years ago
Alternatives and similar repositories for zap-operator:
Users that are interested in zap-operator are comparing it to the libraries listed below
- ☆27Updated 2 months ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- A Security Scanner for Go☆26Updated 5 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- ☆25Updated 3 years ago
- ☆28Updated 4 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆38Updated 2 years ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 3 years ago
- ☆48Updated 4 years ago
- Serverless Workshop☆16Updated 2 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- A zero-dependency tool for finding secrets in directories☆10Updated 3 years ago
- ☆20Updated 6 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated 8 months ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Security scanning & static analysis tool☆93Updated 3 months ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 5 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- ☆17Updated 2 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Updated 5 years ago
- ZAP Management Scripts☆21Updated last week
- ☆14Updated 7 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆19Updated 4 years ago
- ☆38Updated 4 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Updated 6 years ago