Tools for identifying, prioritizing, and remediating security vulnerabilities in systems and applications. Task: Docker
Explore 9 curated tools and resources
A tool to run YARA rules against node_module folders to identify suspicious scripts
A script that checks for common best-practices around deploying Docker containers in production.
A Docker analysis tool for identifying potential security vulnerabilities and weaknesses in Docker environments
Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05
Command line interface for managing and inspecting images, policies, subscriptions, and registries with support for various operating systems and packages.
An open source project for static analysis of vulnerabilities in application containers
A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers
Fuzzapi is a Rails application with a user-friendly UI for API_Fuzzer gem and Docker setup.
Vulnerable web application for beginners in penetration testing.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.