teyhouse / CVE-2024-3094
K8S and Docker Vulnerability Check for CVE-2024-3094
☆10Updated last year
Alternatives and similar repositories for CVE-2024-3094:
Users that are interested in CVE-2024-3094 are comparing it to the libraries listed below
- ☆25Updated 10 months ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆37Updated 2 months ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆22Updated last year
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated 3 weeks ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆23Updated 3 months ago
- Tool to automate build instructions generation☆30Updated last week
- OpenCP shim is a simple HTTP server that implements the Kubernetes API server interface. It is a shim that allows you to use the Kubernet…☆14Updated 2 years ago
- ☆29Updated 2 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆38Updated last year
- Manage AppAmormor profiles for Kubernetes cluster☆41Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆23Updated 9 months ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- Inject Falco and pdig into a running kubernetes pod☆13Updated 4 years ago
- Kubernetes tools in a "distroless" container☆13Updated last year
- Owasp Zap chart for Kubernetes☆50Updated 3 years ago
- A collection of Docker and Kubernetes resources☆18Updated 2 years ago
- Value Provider for Terraform☆16Updated 2 years ago
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Updated 2 years ago
- Kubernetes audit logging, when you don't control the control plane☆71Updated last week
- Generate K8s RBAC policies based on e2e test runs☆28Updated 3 years ago
- ☆14Updated 2 years ago
- Creates PolicyReports based on the different Trivy Operator CRDs like VulnerabilityReports☆57Updated this week
- A simple go init☆36Updated 3 years ago
- Trust Dexter to ensure that all your images are pinned by digest for better security☆29Updated last year
- Manage a directory of binaries without a package manager☆27Updated this week
- An query language and interactive tooling to work with SBOM data.☆14Updated 5 months ago
- ☆53Updated this week
- ☆23Updated 2 years ago
- Sigstore user stories☆29Updated last year