Utility that exposes the expiry of TLS certificates as Prometheus metrics. To build the Docker image, simply run docker build: docker build . -t muxinc/certificate-expiry-monitor:latest. Running: Run the Docker image using the executable at /app: → docker run muxinc/certificate-expiry-monitor:latest /app --help. Usage of ./certificate-expiry-monitor: -domains string Comma-separated SNI domains to query -frequency duration Frequency at which the certificate expiry times are polled (default 1m0s) -hostIP If true, then connect to the host that the pod is running on rather than to the pod itself. -ignoredDomains string Comma-separated list of domains to exclude from the discovered set. This can be a regex if the string is wrapped in forward-slashes like /.*\.domain\.com$/ which would exclude all domain.com subdomains. -ingressNamespaces string If provided, a comma-separated list of namespaces that will be searched for ingresses with domains to automatically query -insecure If true, then the InsecureSkipVerify option will be used with the TLS connection, and the remote certificate and hostname will be trusted without verification (default true) -kubeconfig string Path to kubeconfig
FEATURES
SIMILAR TOOLS
Recorded talks from Hack.lu 2018 covering various cybersecurity topics.
A collection of setup scripts for various security research tools with installers for tools like afl, angr, barf, and more.
Social news aggregation and discussion platform for cybersecurity professionals.
Platform for hosting Jeopardy and 'King of the Hill' style Capture the Flag competitions.
Domain registration and web hosting services with free features and 24/7 customer support
A system for reserving classrooms at the University of Pisa.
A microservice for string padding to prevent global issues like the left-pad incident.
A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.