Linux Containers in 500 Lines of Code is a project that aims to provide a minimal set of restrictions to run untrusted code by utilizing namespaces, capabilities, mounts, system calls, resources, and networking in a concise codebase. The project is an exploration of container setup and security considerations in a literate code format.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
In-depth analysis and insights on various cloud security topics by Rhino Security Labs team
A free training course and lab environment for learning to test and attack cloud infrastructure, including AWS and Azure.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.
Cloud Security Suite (cs-suite) - Version 3.0 Usage for cloud security audits on AWS, GCP, Azure, and DigitalOcean.
An AWS Lambda auditing tool that provides asset visibility and actionable results through statistical analysis and security checks.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
A framework to analyze container images and gather useful information.
Kube-bench is a tool for checking Kubernetes security based on CIS Kubernetes Benchmark.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.