go-pillage-registries Logo

go-pillage-registries

0
Free
Visit Website

This project takes a Docker registry and pillages the manifest and configuration for each image in its catalog. It uses Google's crane command's package, which should follow docker's keychain semantics. If you would like to override this, just change authn.DefaultKeychain as described in the https://github.com/google/go-containerregistry/tree/master/pkg/authn/k8schain Install: ```git clone https://github.com/nccgroup/go-pillage-registries.git cd go-pillage-registries go install ./...``` Usage: ```$ pilreg Usage: pilreg <registry> [flags] Flags: -c, --cache string Path to cache image layers (optional, only used if images are pulled) -h, --help help for pilreg -i, --insecure Fetch Data over plaintext -r, --repos strings list of repositories to scan on the registry. If blank, pilreg will attempt to enumerate them using the catalog API -o, --results string Path to directory for storing results. If blank, outputs configs and manifests as json object to Stdout.(must be used if 'store-images` is enabled) -k, --skip-tls Disables TLS certificate verification -s, --store-images Downloads filesystem for discovered images and stores an archive in the output directory (Disabled by default)

FEATURES

ALTERNATIVES

A customized AWS EKS setup for PCI-DSS, SOC2, and HIPAA compliance

A framework to analyze container images and gather useful information.

A fully managed service that securely stores, rotates, and manages sensitive data such as database credentials and API keys.

AI-Powered Cloud Assistant for building, securing, and operating cloud environments.

Automate AWS security checks and centralize security alerts.

Krampus is a security solution for managing AWS objects and can be used as a cost-control tool.

A tool for discovering company infrastructure and apps on major cloud providers, beneficial for bug bounty hunters and penetration testers.

Centrally Manage Cloud Firewall Rules with AWS Firewall Manager

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved