Deployment checklist for securely deploying Docker
☆605Nov 1, 2016Updated 9 years ago
Alternatives and similar repositories for Docker-Secure-Deployment-Guidelines
Users that are interested in Docker-Secure-Deployment-Guidelines are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in productio…☆9,606Oct 21, 2024Updated last year
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- The Most Comprehensive Docker Security Scanner☆1,531Mar 21, 2026Updated last week
- Hardening and Auditing Tool For Docker Hosts & Containers☆69Jul 4, 2015Updated 10 years ago
- Custom & better AppArmor profile generator for Docker containers.☆1,224Sep 17, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A framework for Static Analysis of Docker container images☆287Aug 26, 2019Updated 6 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- Assessing compliance of a container☆243Dec 2, 2016Updated 9 years ago
- Vulnerability Static Analysis for Containers☆10,951Updated this week
- ☆72Nov 20, 2017Updated 8 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆231Nov 18, 2015Updated 10 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆599Feb 12, 2022Updated 4 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Reconnaissance tool for GitHub organizations☆6,151Sep 20, 2022Updated 3 years ago
- An automated XSS payload generator written in python.☆314Jun 2, 2016Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,115Apr 26, 2020Updated 5 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Library to manipulate CSP reports and policies☆15Apr 18, 2014Updated 11 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- BSidesCBR CTF docker compose files☆66Jun 4, 2020Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Nscan: Fast internet-wide scanner☆535Feb 23, 2015Updated 11 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- My proof-of-concept exploits for the Linux kernel☆1,571Sep 11, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- a passive scanner based on Mitmproxy and Arachni☆108Aug 17, 2017Updated 8 years ago
- a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containe…☆1,224May 23, 2023Updated 2 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Notary is a project that allows anyone to have trust over arbitrary collections of data☆3,288Aug 7, 2024Updated last year
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆382Nov 2, 2017Updated 8 years ago