snyk-labs / docker-goofLinks
A demo repo showcasing Snyk's Docker offering
β34Updated last year
Alternatives and similar repositories for docker-goof
Users that are interested in docker-goof are comparing it to the libraries listed below
Sorting:
- Awesome Snyk community contributions, champions, integrations, blogs, tools and more πβ48Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Securityβ45Updated 6 months ago
- OWASP Serverless Top 10β217Updated 4 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flawsβ328Updated last year
- AWS Certified Security Specialty (2020) course notesβ121Updated 5 years ago
- Hands-on workshop on how to build security automation in pipelinesβ37Updated last year
- OWASP Foundation Web Respositoryβ57Updated 3 months ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approachβ158Updated 2 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request thatβ¦β35Updated 2 years ago
- Examples of integrating the Snyk CLI into a CI/CD systemβ103Updated last year
- Serverless Functions for establishing Reverse Shells to Lambda, Azure Functions, and Google Cloud Functionsβ250Updated 5 months ago
- β94Updated 5 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.β105Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β77Updated 4 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizatβ¦β41Updated 2 years ago
- A walkthrough of security controls for a serverless architecture via a demo applicationβ11Updated 3 years ago
- Public repository of all things cloud security.β48Updated last year
- OWASP Foundation Web Respositoryβ37Updated 3 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.β109Updated last year
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native serβ¦β73Updated 4 years ago
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watchβ¦β103Updated 6 months ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.β20Updated 4 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.β40Updated 4 years ago
- β102Updated 2 weeks ago
- Labs for Threat Modelling training delivered by ControlPlaneβ34Updated last year
- Kubernetes Security Testing Guideβ26Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use β¦β78Updated 2 weeks ago
- Best practices for hardening your AWS account, most of them are freeβ36Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.β48Updated 9 years ago
- Lightspin AWS IAM Vulnerability Scannerβ95Updated 4 years ago