- Home
- Cloud Security
- Container Security
- go-pillage-registries
go-pillage-registries
A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.

go-pillage-registries
A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.
go-pillage-registries Description
go-pillage-registries is a command-line tool designed to extract and analyze Docker registry contents by retrieving manifest and configuration data for each image in a registry's catalog. The tool utilizes Google's crane command package and follows Docker's keychain semantics for authentication. It provides functionality to enumerate repositories within a registry using the catalog API or allows users to specify particular repositories to scan. Key capabilities include: - Extracting image manifests and configurations from Docker registries - Supporting both secure and insecure connections with TLS verification options - Caching image layers locally when images are downloaded - Storing results as JSON output to stdout or saving to specified directories - Optional downloading and archiving of complete filesystem contents for discovered images - Repository enumeration through catalog API or manual specification The tool accepts various command-line flags to customize scanning behavior, including options for insecure connections, TLS certificate verification bypass, result storage paths, and image caching locations.
go-pillage-registries FAQ
Common questions about go-pillage-registries including features, pricing, alternatives, and user reviews.
go-pillage-registries is A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.. It is a Cloud Security solution designed to help security teams with Enumeration, Security Analysis, Configuration Management.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox