testifysec / go-imaLinks
go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems
☆13Updated 2 years ago
Alternatives and similar repositories for go-ima
Users that are interested in go-ima are comparing it to the libraries listed below
Sorting:
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Updated last year
- A trivial wrapper around spf13/cobra to simplify some basic patterns☆22Updated last year
- An query language and interactive tooling to work with SBOM data.☆14Updated last year
- A docker CLI plugin for verifying signed attestations on images☆13Updated last year
- Witness Examples☆11Updated last year
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- Inspect SSL/TLS traffic using eBPF☆19Updated last year
- ☆33Updated 8 months ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated last week
- Generate seccomp profiles from go binaries☆135Updated 7 years ago
- Kubernetes tools in a "distroless" container☆13Updated last year
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 4 years ago
- replace a k8s deployment by a proxy to a pod in another cluster☆10Updated 4 years ago
- Detect compiler names and versions from ELF files☆27Updated 5 months ago
- A kustomize plugin for using age encrypted files in Secrets☆17Updated last month
- OCI viewer☆19Updated 7 months ago
- A library for representing OCI image layers in an abstract filesystem☆27Updated 5 years ago
- Open Policy Agent WebAssembly Go SDK☆21Updated 2 years ago
- The Container Security Book—a free book for practitioners☆82Updated 5 years ago
- Sigstore user stories☆30Updated 2 years ago
- efficient linux security monitoring☆26Updated 7 years ago
- ☆72Updated 2 weeks ago
- Ergonomic OCI registry Go API☆16Updated 2 years ago
- Inject Falco and pdig into a running kubernetes pod☆13Updated 5 years ago
- Determine your cloud provider with a simple HTTP call☆51Updated 3 years ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Updated 4 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated 3 months ago
- Go beyond package manager discovery for SBOM☆18Updated 3 years ago
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago