☆29Jan 31, 2025Updated last year
Alternatives and similar repositories for dostainer
Users that are interested in dostainer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13May 10, 2023Updated 3 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44May 7, 2026Updated 2 weeks ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆36Oct 17, 2024Updated last year
- A k6 extension for creating notifications.☆22Jun 10, 2024Updated last year
- Personal infrastructure☆12Feb 12, 2026Updated 3 months ago
- Ingest demo logs using API and log.ingest access tokens☆15Mar 18, 2026Updated 2 months ago
- ☆27Feb 19, 2026Updated 3 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A flexible and composable configuration library for Go that doesn't suck☆15Jul 28, 2023Updated 2 years ago
- ☆51May 19, 2020Updated 6 years ago
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary prot…☆17Mar 13, 2020Updated 6 years ago
- A k6 extension to test the performance of a Redis instance☆38May 15, 2026Updated last week
- Proof of concept exploit about OpenSSL signature_algorithms_cert DoS flaw (CVE-2020-1967)☆19Jun 16, 2024Updated last year
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Jul 20, 2022Updated 3 years ago
- A k6 extension for Redis.☆14Oct 27, 2022Updated 3 years ago
- Kubernetes Pwnage for all☆59Nov 14, 2020Updated 5 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- Script to assist in gathering logs and other debugging info from a Juju model☆10Nov 16, 2023Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆352Mar 21, 2025Updated last year
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago
- This project connects SNMP Trap sending source to Splunk Enterprise and Splunk Enterprise Cloud☆10Dec 14, 2021Updated 4 years ago
- Here is a common vulnerability when Kubernetes Controller designed.☆10Dec 11, 2023Updated 2 years ago
- Ansible fluentd role for Debian-based systems☆16May 23, 2015Updated 11 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆164Nov 28, 2025Updated 5 months ago
- ☆19Jan 31, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- Federated Open-Registry proxy for p2p sharing of packages☆13May 18, 2019Updated 7 years ago
- Binary Ninja Syscall Annotator☆47May 18, 2022Updated 4 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- Kubectl, Kustomize, Helm and Helmfile version manager☆38Apr 14, 2022Updated 4 years ago
- Continuous K6 load tests on K8s.☆19May 11, 2021Updated 5 years ago
- Generate datasets of cloud audit logs for common attacks☆237May 7, 2026Updated 2 weeks ago