go-pillage-registries Logo

go-pillage-registries

0
Free
Visit Website

This project takes a Docker registry and pillages the manifest and configuration for each image in its catalog. It uses Google's crane command's package, which should follow docker's keychain semantics. If you would like to override this, just change authn.DefaultKeychain as described in the https://github.com/google/go-containerregistry/tree/master/pkg/authn/k8schain Install: ```git clone https://github.com/nccgroup/go-pillage-registries.git cd go-pillage-registries go install ./...``` Usage: ```$ pilreg Usage: pilreg <registry> [flags] Flags: -c, --cache string Path to cache image layers (optional, only used if images are pulled) -h, --help help for pilreg -i, --insecure Fetch Data over plaintext -r, --repos strings list of repositories to scan on the registry. If blank, pilreg will attempt to enumerate them using the catalog API -o, --results string Path to directory for storing results. If blank, outputs configs and manifests as json object to Stdout.(must be used if 'store-images` is enabled) -k, --skip-tls Disables TLS certificate verification -s, --store-images Downloads filesystem for discovered images and stores an archive in the output directory (Disabled by default)

FEATURES

ALTERNATIVES

A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies

Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.

Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.

A comprehensive cloud security platform that provides threat prevention, posture management, and risk prioritization across cloud applications, networks, and workloads.

Commercial

A tool for discovering company infrastructure and apps on major cloud providers, beneficial for bug bounty hunters and penetration testers.

A cloud-based security platform providing WAAP, ZTNA, public cloud security management, and threat intelligence sharing capabilities.

Commercial

Open-source policy-as-code software for multi-cloud and SaaS environments with GPT model conversations and custom analysis policies.

A tool that discovers all AWS resources created in an account

PINNED