The Buildah package provides a command line tool that can be used to create a working container, either from scratch or using an image as a starting point. Images can be built in either the OCI image format or the traditional upstream docker image format. It allows users to mount and unmount a working container's root filesystem, use the updated contents of a container's root filesystem to create a new image, delete a working container or an image, and rename a local container. For more information, visit the buildah.io website for blogs, release announcements, demos, changelog, contributing guidelines, development plan, installation notes, troubleshooting guide, and tutorials. Buildah and Podman are two complementary open-source projects available on most Linux platforms, residing on GitHub.com.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A customized AWS EKS setup for PCI-DSS, SOC2, and HIPAA compliance
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.
An AI-powered Cloud Native Application Protection Platform (CNAPP) that provides unified cloud security with attack surface management for small and medium businesses.
Cloud runtime security platform that uses eBPF technology to monitor cloud infrastructure, detect anomalies, and identify potential security threats in real-time.
Tool for assessing compliance and running vulnerability scans on Docker images.
A tool that discovers all AWS resources created in an account
Open-source cloud-agnostic resource manager for analyzing and managing cloud cost, usage, security, and governance.
A setuid implementation of a subset of user namespaces, providing a way to run unprivileged containers without requiring root privileges.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.