Kube Scankube-scan: Octarine k8s cluster risk assessment tool
Stars: ✭ 566 (+409.91%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (+68.47%)
dep-scanFully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+211.71%)
posteeSimple message routing system that receives input messages through a webhook interface and can enforce actions using predefined outputs via integrations.
Stars: ✭ 160 (+44.14%)
WhispersIdentify hardcoded secrets and dangerous behaviours
Stars: ✭ 66 (-40.54%)
django-security-checkHelps you continuously monitor and fix common security vulnerabilities in your Django application.
Stars: ✭ 69 (-37.84%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-35.14%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+4009.01%)
prowlerProwler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+7148.65%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+2781.08%)
ThreatmapperIdentify vulnerabilities in running containers, images, hosts and repositories
Stars: ✭ 361 (+225.23%)
Web exploit detectorThe Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-27.03%)
Github DorksFind leaked secrets via github search
Stars: ✭ 1,332 (+1100%)
Pest🐞 Primitive Erlang Security Tool
Stars: ✭ 79 (-28.83%)
Mobile Security Framework MobsfMobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+9100%)
DevsecopsThis repository contains information about DevSecOps and how to get involved in this community effort.
Stars: ✭ 103 (-7.21%)
NotrulerThe opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.
Stars: ✭ 72 (-35.14%)
Gscan本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。
Stars: ✭ 1,177 (+960.36%)
FrostUnit testing framework for test driven security of AWS, GCP, Heroku and more.
Stars: ✭ 91 (-18.02%)
Jina HubAn open-registry for hosting Jina executors via container images
Stars: ✭ 71 (-36.04%)
Awesome MicroservicesA curated list of Microservice Architecture related principles and technologies.
Stars: ✭ 10,642 (+9487.39%)
PorcupineThreading, Resiliency and Monitoring for Java EE 7/8
Stars: ✭ 99 (-10.81%)
Stolon ChartKubernetes Helm chart to deploy HA Postgresql cluster based on Stolon
Stars: ✭ 90 (-18.92%)
Awesome Cloud NativeA curated list for awesome cloud native tools, software and tutorials. - https://jimmysong.io/awesome-cloud-native/
Stars: ✭ 1,157 (+942.34%)
Kogito ExamplesKogito examples - Kogito is a cloud-native business automation technology for building cloud-ready business applications.
Stars: ✭ 96 (-13.51%)
ElasticsearchRun Elasticsearch in Kubernetes
Stars: ✭ 80 (-27.93%)
Staffjoy微服务(Microservices)和云原生架构教学案例项目,基于Spring Boot和Kubernetes技术栈
Stars: ✭ 1,391 (+1153.15%)
RookStorage Orchestration for Kubernetes
Stars: ✭ 9,369 (+8340.54%)
KleverCloud Native ML/DL Platform
Stars: ✭ 95 (-14.41%)
SiddhiStream Processing and Complex Event Processing Engine
Stars: ✭ 1,185 (+967.57%)
MicroMicro is a distributed cloud operating system
Stars: ✭ 10,778 (+9609.91%)
GnesGNES is Generic Neural Elastic Search, a cloud-native semantic search system based on deep neural network.
Stars: ✭ 1,178 (+961.26%)
Aws Securitygroup GrapherThis ansible role gets information from an AWS VPC and generate a graphical representation of security groups
Stars: ✭ 93 (-16.22%)
DrekA static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a large application, with an emphasis on identifying development anti-patterns and footguns.
Stars: ✭ 103 (-7.21%)
CloudserverZenko CloudServer, an open-source Node.js implementation of the Amazon S3 protocol on the front-end and backend storage capabilities to multiple clouds, including Azure and Google.
Stars: ✭ 1,167 (+951.35%)
Nats ServerHigh-Performance server for NATS.io, the cloud and edge native messaging system.
Stars: ✭ 10,223 (+9109.91%)
IotsharkIotShark - Monitoring and Analyzing IoT Traffic
Stars: ✭ 69 (-37.84%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-19.82%)
Cloud Security AuditA command line security audit tool for Amazon Web Services
Stars: ✭ 68 (-38.74%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+7867.57%)
Kubernetes HandbookKubernetes中文指南/云原生应用架构实践手册 - https://jimmysong.io/kubernetes-handbook
Stars: ✭ 9,420 (+8386.49%)
VsauditVOIP Security Audit Framework
Stars: ✭ 97 (-12.61%)
Secure Ios App DevCollection of the most common vulnerabilities found in iOS applications
Stars: ✭ 1,288 (+1060.36%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+8131.53%)
Cloud Native LabsThe Labs for Cloud Native Roadshow on OpenShift https://www.openshift.com/
Stars: ✭ 64 (-42.34%)
KymaA flexible and easy way to connect and extend enterprise applications in a cloud-native world
Stars: ✭ 1,118 (+907.21%)
Gda Android Reversing ToolGDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, dat…
Stars: ✭ 2,332 (+2000.9%)
CobaltInfrastructure turn-key solution for app service workloads
Stars: ✭ 97 (-12.61%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (-21.62%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-44.14%)
Awesome Devsecops ruПодборка выступлений и публикаций на тему DevSecOps на русском и не только)
Stars: ✭ 62 (-44.14%)
WorkflowsRun Cloud Native workflows on any environment using Dapr
Stars: ✭ 84 (-24.32%)
Audit scriptsScripts to gather system configuration information for offline/remote auditing
Stars: ✭ 55 (-50.45%)