
YaraHunter is a free Container Security tool. Security professionals most commonly compare it with Deepfence YaraHunter, Plexicus Container Security. All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to YaraHunter, including their key features and shared capabilities.
Scans containers & filesystems for malware using YARA rules
Container security platform scanning images, enforcing K8s policies & runtime threats
Container security platform with image scanning, admission control, and runtime
Container & source code scanning for vulnerabilities, malware, and secrets
Container image scanning & runtime security for containerized applications
Container security scanning and vulnerability management solution
Container & Kubernetes vulnerability scanning with automated remediation
Container security scanner for Docker images with vulnerability detection
Container security platform scanning images, enforcing K8s policies & runtime threats
Container security platform with image scanning, admission control, and runtime
Container & source code scanning for vulnerabilities, malware, and secrets
Container image scanning & runtime security for containerized applications
Container & Kubernetes vulnerability scanning with automated remediation
Container security scanner for Docker images with vulnerability detection
Container security platform for vulnerability scanning and policy enforcement
Kubernetes policy mgmt platform for securing & enforcing compliance across clusters
Container scanning tool for detecting secrets, misconfigurations, and code issues
Container security platform for Kubernetes with runtime protection & policies
Open source Zero Trust container security platform for Kubernetes environments
Curated container image registry with continuous patching and zero drift
SCA tool for scanning container images for vulnerabilities and compliance.
Container vulnerability & license scanner with deep dependency tree analysis.
A container compliance and vulnerability assessment tool that uses OpenSCAP to scan Docker images and running containers for security vulnerabilities and compliance violations.
Kube-bench is a security assessment tool that validates Kubernetes deployments against CIS Kubernetes Benchmark standards through automated configuration checks.
kube-hunter is a security scanning tool that identifies vulnerabilities and security weaknesses in Kubernetes clusters through automated assessment and provides detailed reporting with remediation guidance.
Clair is an open source static analysis tool that scans application containers for known vulnerabilities through API-based image indexing and matching.
A Docker security analysis tool that scans containers and networks to identify vulnerabilities and security weaknesses in Docker environments.
MKIT is a Docker-based security assessment tool that identifies common misconfigurations in managed Kubernetes clusters across AKS, EKS, and GKE platforms.
SecretScanner is a standalone tool that scans container images and filesystems to detect approximately 140 types of unprotected secrets and sensitive credentials.
Docker's Actuary is an automated security assessment tool that checks Docker container deployments against configurable best-practice checklists to ensure production readiness.
An open-source script that performs automated security assessments of Docker containers and hosts against CIS Docker Benchmark standards.
A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.
A Docker MultiStage build implementation that integrates CVE scanning into Alpine Linux container builds using Docker 17.05's build-time vulnerability assessment capabilities.
Kubernetes security posture management with compliance monitoring and risk assessment
Container and Linux workload security for hybrid and multi-cloud environments
Policy enforcement & compliance mgmt for container security across SDLC
KSPM solution for detecting and remediating Kubernetes misconfigurations
Container image scanning tool for Kubernetes & Docker with CVE detection
K8s security platform with KSPM, runtime protection, and admission control
Full lifecycle container security platform from build to runtime
Container security scanning with reachability and exploitability analysis
Container and Kubernetes security platform with runtime visibility and detection
Container security scanning from development to deployment environments
Istio-based service mesh for 5G microservices & cloud-native deployments
Secure container images with minimal CVEs, FIPS validation, and STIG hardening
Zero-CVE container and VM images with daily rebuilds and SBOMs
Minimal, zero-CVE virtual machine images for container hosts and applications
Runtime container security platform providing workload isolation via microVMs
Managed container security with network IDS and log management for containers
K8s security platform with scanning, policy enforcement, and RBAC controls
Kubernetes security platform for network policy, compliance & observability
Network security & observability platform for Kubernetes environments
Enterprise Kubernetes networking platform built on Cilium and eBPF
Common questions security professionals ask when evaluating alternatives and competitors to YaraHunter.
The most popular alternatives to YaraHunter include Deepfence YaraHunter, Plexicus Container Security, Trend Micro Container Security, Anchore Secure, and Checkmarx Container Security. These Container Security tools offer similar capabilities and are frequently compared by security professionals evaluating their options.