active-scan-plus-plus
ThreatMapper
active-scan-plus-plus | ThreatMapper | |
---|---|---|
3 | 32 | |
203 | 4,637 | |
1.0% | 0.4% | |
4.1 | 9.9 | |
6 months ago | 1 day ago | |
Python | TypeScript | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
active-scan-plus-plus
-
RCE 0-day exploit found in log4j, a popular Java logging package
Rules for Burp Suite ActiveScan++
- Log4j RCE Found
ThreatMapper
- ThreatMapper: Open-source cloud native security observability platform
-
OSS Security - Deepfence Threat Mapper
Though the Reddit-Mod war has delivered another excellent find. well several actually, but the one I'm posting now is called "Threat Mapper". Its a security scanner, will a fantastic UI, and works across most infrastructure... including VMs, Containers and the main Cloud Providers..
-
Detecting Threats on 100k Servers, 1000s of Cloud Accounts, 2500 K8s Clusters
https://github.com/deepfence/ThreatMapper
-
Vulnerability scanning tools for homelab?
If you like Wiz.io but don't have a million dollars or so lying around, I'm finding the community edition of Deepfence (https://deepfence.io/) pretty good.
-
CSPM opensource suggestions
Magpie https://github.com/openraven/magpie ThreatMapper https://github.com/deepfence/ThreatMapper Cloudquery https://github.com/cloudquery/cloudquery
- ThreatMapper β open-source cloud native security observability platform
-
Official /r/rust "Who's Hiring" thread for job-seekers and job-offerers [Rust 1.64]
Company: https://deepfence.io
-
Looking for infrastructure monitoring solutions.
And deepfence.imo for vurnalbility scans https://github.com/deepfence/ThreatMapper
-
Free vulnerability scanners
ThreatMapper is an option for your team member, particularly if you're looking to scan Kubernetes or Fargate environments as the installation is very easy. It's a little more complex for hosts (you need to install a docker runtime on each to run the sensor locally), but should be worth any additional trouble. The GUI gives you a map of workloads, traffic flows, vulnerabilities found on each workload and host, and which are highest risk.
-
Do you / how do you scan for vulnerabilities once your code is in production?
Full disclosure - I work for an open source project called ThreatMapper that performs run-time vulnerability scanning and anything you say might be used to make the project better - thank you!
What are some alternatives?
apache-log4j-rce-poc
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Log4jAttackSurface
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
log4j-patch - Non intrusive log4j2 RCE vulnerability patch.
kubesphere - The container platform tailored for Kubernetes multi-cloud, datacenter, and edge management β π₯ βοΈ
Apache Log4j 2 - Apache Log4j 2 is a versatile, feature-rich, efficient logging API and backend for Java.
kubescape - Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
apache-log4j-poc - Apache Log4j θΏη¨δ»£η ζ§θ‘
devspace - DevSpace - The Fastest Developer Tool for Kubernetes β‘ Automate your deployment workflow with DevSpace and develop software directly inside Kubernetes.
tsunami-security-scanner-plugins - This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
openscap - NIST Certified SCAP 1.2 toolkit