thomasfricke / container-hardeningLinks
scripts which help harden containers
☆32Updated 3 years ago
Alternatives and similar repositories for container-hardening
Users that are interested in container-hardening are comparing it to the libraries listed below
Sorting:
- Keycloak Configuration Auditor☆84Updated this week
- ☆176Updated 3 years ago
- Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive d…☆160Updated this week
- Helm Charts for Dependency-Track☆45Updated this week
- GitHub app for SBOM creation using cdxgen and upload to Dependency-Track☆20Updated this week
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆198Updated this week
- This is the Mercedes-Benz FOSS Manifesto - our path to embrace Open Source☆84Updated 4 months ago
- A Kubernetes Operator for managing realms through the Keycloak Admin API☆35Updated 2 years ago
- a bash openid connect client☆119Updated 7 months ago
- Keycloak's Site Reliability Engineers Special Interest Group (Keycloak SRE SIG): To improve the lives of people running and operating Key…☆30Updated 3 weeks ago
- Management of application landscapes for teams☆29Updated 3 years ago
- Vulnerable Java Web Application (for demo and education purposes)☆65Updated 6 months ago
- Service implementing some parts of OAuth 2.0 Token Exchange (https://www.rfc-editor.org/rfc/rfc8693.html)☆18Updated last month
- Incubating project for decoupling responsibilities from Dependency-Track's monolithic API server into separate, scalable services.☆93Updated this week
- HaveIBeenPwned Password Policy for Keycloak PoC☆12Updated 6 years ago
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆80Updated last week
- Save The planet by auto turn off your pods on kubernetes☆108Updated 3 weeks ago
- This repo includes a demo that shows how a Kubernetes cluster can be hijacked and how to prevent it using common best practices.☆46Updated 2 years ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆95Updated this week
- ☆119Updated 8 months ago
- Enrich SBOMs with data from third party services☆202Updated this week
- Exposing Keycloak metrics endpoints for Prometheus!☆15Updated 6 years ago
- Produce an Open Source Vulnerability JSON file based on information in an SPDX document☆65Updated last year
- A standard API specification for exchanging supply chain artifacts and intelligence☆95Updated last month
- Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.☆78Updated 2 years ago
- Machine-readable specification for the attestation of security-relevant data.☆67Updated 3 months ago
- ☆134Updated this week
- a third party module that extends keycloak by SCIM functionality☆200Updated last year
- SCS standards in a machine readable format☆39Updated this week
- The ContainerSSH website☆32Updated this week