Loading...

A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.

A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.
go-pillage-registries is a command-line tool designed to extract and analyze Docker registry contents by retrieving manifest and configuration data for each image in a registry's catalog. The tool utilizes Google's crane command package and follows Docker's keychain semantics for authentication. It provides functionality to enumerate repositories within a registry using the catalog API or allows users to specify particular repositories to scan. Key capabilities include: - Extracting image manifests and configurations from Docker registries - Supporting both secure and insecure connections with TLS verification options - Caching image layers locally when images are downloaded - Storing results as JSON output to stdout or saving to specified directories - Optional downloading and archiving of complete filesystem contents for discovered images - Repository enumeration through catalog API or manual specification The tool accepts various command-line flags to customize scanning behavior, including options for insecure connections, TLS certificate verification bypass, result storage paths, and image caching locations.
Common questions about go-pillage-registries including features, pricing, alternatives, and user reviews.
go-pillage-registries is A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.. It is a Cloud Security solution designed to help security teams with Enumeration, Configuration Management, Reconnaissance.
Kubernetes security posture management with compliance monitoring and risk assessment
Kube-bench is a security assessment tool that validates Kubernetes deployments against CIS Kubernetes Benchmark standards through automated configuration checks.
Get strategic cybersecurity insights in your inbox