🧹 Cleaning up images from Kubernetes nodes
-
Updated
Jun 11, 2024 - Go
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
🧹 Cleaning up images from Kubernetes nodes
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
Hourly updated database of exploit and exploitation reports
HackerOne "in scope" domains
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
A Ruby micro-framework for writing and running exploits
PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
Asset inventory of over 800 public bug bounty programs.
My Privacy DNS #Matrix lists for blacklisting
Athena OS is a Arch/Nix-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!
Infection Monkey - An open-source adversary emulation platform
Integrate static security testing with HCL AppScan on Cloud using GitHub Actions
🛡️ The missing GraphQL security security layer for Apollo GraphQL and Yoga / Envelop servers 🛡️
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others), or if you know the components used, you can get a list of known vulnerabilities associated with an SBOM or a list of components and versions.
Ingesting, pipelining, and enhancing your DNS logs with usage indicators, security analysis, and additional metadata.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Open source vulnerability DB and triage service.