pjbgf / zaz
A command line tool to automatically generate seccomp profiles.
☆25Updated 3 years ago
Related projects: ⓘ
- Falco plugins registry☆82Updated this week
- Convert Falco logs to Docker seccomp profiles☆20Updated 8 years ago
- Service implementation for a Kubernetes Dynamic Webhook controller for interacting with Anchore☆63Updated last week
- ☆35Updated 2 years ago
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆123Updated last week
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆78Updated 2 weeks ago
- Kubernetes Common Configuration Scoring System☆125Updated 2 years ago
- agent for handling seccomp descriptors for container runtimes☆41Updated 7 months ago
- Administrative tooling for Falco☆88Updated this week
- Cloud Native Security Hub - Security Resources☆55Updated 4 years ago
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-u…☆62Updated this week
- Prometheus Metrics Exporter for Falco output events☆118Updated last month
- A replacement for "kubectl exec" that works over WebSocket connections.☆27Updated 5 months ago
- sigstore the hard way!☆110Updated 4 months ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆55Updated this week
- A kubectl plugin which triggers a Sysdig capture☆99Updated last year
- cloud native software supply chain ☁️🔗☆64Updated 3 years ago
- Transparenty Immutable Container Image Tags☆19Updated last year
- ptrace-based event producer for udig☆66Updated 2 years ago
- vexctl is a tool to attest VEX impact statements☆44Updated last year
- Kit for building Falco drivers: kernel modules or eBPF probes☆64Updated last week
- Security risk analysis for Kubernetes resources☆75Updated 9 months ago
- A tool for in-depth analysis of container checkpoints☆95Updated last month
- Generate a variety of suspect actions that are detected by Falco rulesets☆87Updated 3 weeks ago
- Evolution process of The Falco Project☆48Updated this week
- ☆61Updated 4 months ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆21Updated last week
- Octant plugin for viewing Starboard security information☆57Updated 2 years ago
- Integrates Spiffe and Vault to have secretless authentication☆82Updated last week
- Kubernetes operator for Falco that allows developers to manage rules for detecting intruders and backdoors☆68Updated 4 years ago