Explore 56 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
Airlock Secure Access Hub is an integrated security platform that combines identity and access management with web application and API protection to secure digital applications while maintaining user experience.
An integrated application security platform that combines software composition analysis, container scanning, and runtime security monitoring to identify and prioritize vulnerabilities based on actual usage and risk.
A cloud-native application protection platform that provides comprehensive security monitoring, vulnerability management, and threat detection for cloud environments and container workloads.
A cloud-native security platform that combines vulnerability management, workload protection, and security monitoring for cloud environments with context-aware threat detection capabilities.
Cloud security platform that provides configuration monitoring, compliance management, and security analysis across multi-cloud environments.
Runtime protection platform that secures AI applications, APIs, and cloud-native environments through automated threat detection and data protection mechanisms.
A cloud native security platform that uses behavioral fingerprinting and runtime verification to detect threats across Kubernetes environments, cloud infrastructure, and software supply chains.
A cloud security platform that combines Kubernetes security scanning, runtime monitoring, and cloud security posture management using Kubescape and eBPF technology.
Application security platform that combines SAST and SCA with runtime intelligence to validate vulnerability exploitability and provide contextual remediation guidance.
Runtime application security platform that provides vulnerability management, patching, and threat detection at the application level during program execution.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Aqua Security is a CNAPP that provides comprehensive security for cloud native applications across their entire lifecycle, from development to production, in various cloud and container environments.
CloudDefense.AI is a Cloud Native Application Protection Platform (CNAPP) that safeguards cloud infrastructure and cloud-native apps with expertise, precision, and confidence.
Anchore Enterprise is a platform that protects and secures software supply chains end-to-end.
kube-hunter hunts for security weaknesses in Kubernetes clusters.
A repository of pre-defined detections for security threats and abnormal behaviors in Falco.
YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.
Conmachi is a Golang tool for scanning container environments for security issues.
Managed Kubernetes Inspection Tool leveraging FOSS tools to query and validate security-related settings.
Tool for assessing compliance and running vulnerability scans on Docker images.
Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.
A project exploring minimal set of restrictions for running untrusted code using Linux containers in a concise codebase.
gVisor is an application kernel that provides isolation for running sandboxed containers.
Metadata repository with installation tools and cloud provider support.
Create Docker container images for testing and long-term use.
Troje is a honeypot that creates a realistic environment within lxc containers to monitor and record traffic and changes to drives.
Contains various use cases of Kubernetes Network Policies and sample YAML files.
A tool for pillaging Docker registries to extract image manifests and configurations.
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
A tool that finds unprotected secrets in container images or file systems, matching against a database of 140 secret types.
A cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments
Real-time, container-based file scanning system for threat hunting and incident response.
A subset of the Modern Honey Network project set up to run in docker, including hpfeeds broker, cowrie honeypot, and dionaea honeypot.
A framework to analyze container images and gather useful information.
Redirects EC2 metadata API traffic to a container that retrieves temporary AWS credentials and proxies other calls to the EC2 metadata API.
A Docker analysis tool for identifying potential security vulnerabilities and weaknesses in Docker environments
Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.
A tool for building Open Container Initiative (OCI) container images with various functionalities.
Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.
A collection of tips and tricks for container and container orchestration hacking
Weave Scope automatically generates a map of your application for troubleshooting and monitoring Docker & Kubernetes.
A tool to conduct preliminary security checks in code, infrastructure, or IAM configurations using various open-source tools.
A security framework for process isolation and sandboxing based on capability-based security principles.
A workload policy enforcement tool for Kubernetes with various supported policies and configuration options.
A setuid implementation of a subset of user namespaces, providing a way to run unprivileged containers without requiring root privileges.
An open source project for static analysis of vulnerabilities in application containers
Docker's Actuary automates security best-practices checks for Docker containers.
A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.
Forensics tool for exploring offline Docker filesystems.
Custom AppArmor profile generator for Docker containers with file globbing.