snowcat

Security auditor

Automated tool to detect security vulnerabilities in Istio clusters by analyzing configuration and audit best practices

a tool to audit the istio service mesh

GitHub

173 stars
14 watching
6 forks
Language: Go
last commit: about 3 years ago

Related projects:

Repository Description Stars
praetorian-inc/gato An enumeration and attack tool for identifying vulnerabilities in GitHub pipelines. 570
tenable/terrascan Detects security vulnerabilities and compliance issues in infrastructure code before provisioning cloud-native infrastructure. 4,766
openscanner/xguardian A security scanner for OSX applications 41
praetorian-inc/fingerprintx Tool for identifying and fingerprinting open services on host ports 570
azure/counterfit An automation tool that assesses the security of machine learning systems by bringing together various adversarial frameworks under one platform. 806
boostsecurityio/poutine Detects misconfigurations and vulnerabilities in software supply chains during build pipelines. 229
stamusnetworks/kts Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. 33
praetorian-inc/noseyparker Find secrets and sensitive information in textual data 1,693
paretosecurity/pareto-mac Automates security audits on macOS to ensure best practices are followed 326
vchinnipilli/kubestriker Automates security audits of Kubernetes clusters to identify misconfigurations and vulnerabilities 991
mertdas/privkit A tool designed to detect and identify potential privilege escalation vulnerabilities on Windows systems through configuration mischecks. 365
tylerwince/flake8-bandit Automated security testing tool 111
geiger-rs/cargo-geiger Detects usage of unsafe Rust in Rust crates and their dependencies to provide statistical input for auditing. 1,410
secdec/attack-surface-detector-burp Identifies web app endpoints and parameters to help detect vulnerabilities 98
portswigger/html5-auditor An HTML validation and security testing tool for identifying vulnerabilities in web applications 4