Certificate Expiry Monitor Logo

Certificate Expiry Monitor

0
Free
Visit Website

Utility that exposes the expiry of TLS certificates as Prometheus metrics. To build the Docker image, simply run docker build: docker build . -t muxinc/certificate-expiry-monitor:latest. Running: Run the Docker image using the executable at /app: → docker run muxinc/certificate-expiry-monitor:latest /app --help. Usage of ./certificate-expiry-monitor: -domains string Comma-separated SNI domains to query -frequency duration Frequency at which the certificate expiry times are polled (default 1m0s) -hostIP If true, then connect to the host that the pod is running on rather than to the pod itself. -ignoredDomains string Comma-separated list of domains to exclude from the discovered set. This can be a regex if the string is wrapped in forward-slashes like /.*\.domain\.com$/ which would exclude all domain.com subdomains. -ingressNamespaces string If provided, a comma-separated list of namespaces that will be searched for ingresses with domains to automatically query -insecure If true, then the InsecureSkipVerify option will be used with the TLS connection, and the remote certificate and hostname will be trusted without verification (default true) -kubeconfig string Path to kubeconfig

FEATURES

ALTERNATIVES

CTFd is a Capture The Flag framework with extensive features for creating and managing CTF competitions.

Assess, audit, and evaluate configurations of AWS resources.

UPX is a high-performance executable packer for various executable formats.

A book that helps improve Docker security by covering risks and countermeasures

A tool to easily automate and multithread your pentesting and bug bounty workflow without any coding

Recorded talks from Hack.lu 2018 covering various cybersecurity topics.

A lightweight CTF platform inspired by motherfuckingwebsite.com with a focus on challenge difficulty.

Catch up on the latest cybersecurity news and updates from around the world.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved