thomasfricke / container-hardeningLinks
scripts which help harden containers
☆32Updated 3 years ago
Alternatives and similar repositories for container-hardening
Users that are interested in container-hardening are comparing it to the libraries listed below
Sorting:
- Keycloak Configuration Auditor☆85Updated this week
- ☆176Updated 3 years ago
- Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive d…☆161Updated last week
- Keycloak's Site Reliability Engineers Special Interest Group (Keycloak SRE SIG): To improve the lives of people running and operating Key…☆30Updated last month
- Helm Charts for Dependency-Track☆46Updated 2 weeks ago
- a bash openid connect client☆119Updated 8 months ago
- ☆63Updated 3 weeks ago
- GitHub app for SBOM creation using cdxgen and upload to Dependency-Track☆21Updated this week
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆214Updated last week
- ☆120Updated 8 months ago
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆200Updated last week
- ☆134Updated this week
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆81Updated last month
- Store and access your secrets the Kubernetes native way with any external KMS.☆181Updated 2 years ago
- A BOM repository server for distributing CycloneDX BOMs☆85Updated 6 months ago
- (Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudi…☆16Updated last year
- Packer plugin for Hetzner Cloud Builder☆41Updated last week
- Terraform provider for Hetzner DNS☆49Updated 2 months ago
- CycloneDX CLI tool for SBOM analysis, merging, diffs and format conversions.☆438Updated last month
- This repo includes a demo that shows how a Kubernetes cluster can be hijacked and how to prevent it using common best practices.☆46Updated 2 years ago
- Vulnerable Java Web Application (for demo and education purposes)☆66Updated 6 months ago
- Exposing Keycloak metrics endpoints for Prometheus!☆15Updated 6 years ago
- Inspect certificate authorities in container images☆240Updated last month
- A Kubernetes Operator for managing realms through the Keycloak Admin API☆36Updated 2 years ago
- Service implementing some parts of OAuth 2.0 Token Exchange (https://www.rfc-editor.org/rfc/rfc8693.html)☆18Updated 2 weeks ago
- Scans SBOMs for vulnerabilities with Grype☆85Updated last week
- Incubating project for decoupling responsibilities from Dependency-Track's monolithic API server into separate, scalable services.☆92Updated this week
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆100Updated this week
- 🚀 The collaborative collection of open source CI/CD templates to help everyone quickly build powerful pipelines.☆28Updated 11 months ago
- Load tests keycloak with K6☆16Updated 4 years ago