Found 28 bookmarks
Newest
Harbor
Harbor
"Harbor is an open source container image registry that secures images with role-based access control, scans images for vulnerabilities, and signs images as trusted. A CNCF Incubating project, Harbor delivers compliance, performance, and interoperability to help you consistently and securely manage images across cloud native compute platforms like Kubernetes and Docker."
Harbor
Cilium
Cilium

"A microservices-based application is split into small independent services that communicate with each other via APIs using lightweight protocols like HTTP, gRPC, Kafka and more. However, existing Linux network security mechanisms (e.g., iptables) only operate at the network and transport layers (i.e., IP addresses and ports) and lack visibility into the microservices layer.

Cilium brings API-aware network security filtering to Linux container frameworks like Docker and Kubernetes. Using a new Linux kernel technology called BPF, Cilium provides a simple and efficient way to define and enforce both network-layer and application-layer security policies based on container/pod identity."

Cilium
Home | OpenSCAP portal
Home | OpenSCAP portal
"The OpenSCAP ecosystem provides multiple tools to assist administrators and auditors with assessment, measurement, and enforcement of security baselines. We maintain great flexibility and interoperability, reducing the costs of performing security audits."
Home | OpenSCAP portal
Kubernetes Security
Kubernetes Security
"From outside the cluster, kube-hunter probes a domain or address range for open Kubernetes-related ports, and tests for any configuration issues that leave your cluster exposed to attackers. You’ll get a full report that highlights these security concerns. The source code is available on GitHub and we welcome contributions to extend the set of tests. "
Kubernetes Security
Shieldfy : Web application protection & security monitoring for web developers
Shieldfy : Web application protection & security monitoring for web developers

"We provide you with details about every threat , including every step hacker did since he landed on your web application what type of browser & os he uses and where is he came from. Also what he did on your website to find a weakness and hist attempts to exploit this weakness.

That insights help you to find weakness and vulnerabilities faster."

Shieldfy : Web application protection & security monitoring for web developers
Wapiti : a Free and Open-Source web-application vulnerability scanner in Python for Windows, Linux, BSD, OSX
Wapiti : a Free and Open-Source web-application vulnerability scanner in Python for Windows, Linux, BSD, OSX

"Wapiti allows you to audit the security of your web applications.

It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data.

Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.

"

Wapiti : a Free and Open-Source web-application vulnerability scanner in Python for Windows, Linux, BSD, OSX
Suricata | Open Source IDS / IPS / NSM engine
Suricata | Open Source IDS / IPS / NSM engine
"Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors."
Suricata | Open Source IDS / IPS / NSM engine
skipfish - web application security scanner - Google Project Hosting
skipfish - web application security scanner - Google Project Hosting

"Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments.

Key features:

High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets. Ease of use: heuristics to support a variety of quirky web frameworks and mixed-technology sites, with automatic learning capabilities, on-the-fly wordlist creation, and form autocompletion. Cutting-edge security logic: high quality, low false positive, differential security checks, capable of spotting a range of subtle flaws, including blind injection vectors. The tool is believed to support Linux, FreeBSD, MacOS X, and Windows (Cygwin) environments."

skipfish - web application security scanner - Google Project Hosting
GAUNTLT - Go Ahead, Be Mean To Your Code - Security and Rugged Testing
GAUNTLT - Go Ahead, Be Mean To Your Code - Security and Rugged Testing
"Gauntlt provides hooks to a variety of security tools and puts them within reach of security, dev and ops teams to collaborate to build rugged software. It is built to facilitate testing and communication between groups and create actionable tests that can be hooked into your deploy and testing processes."
GAUNTLT - Go Ahead, Be Mean To Your Code - Security and Rugged Testing
Check your PHP project for known security issues - SensioLabs Security Advisories Checker
Check your PHP project for known security issues - SensioLabs Security Advisories Checker
You manage your PHP project dependencies with Composer, right? But are you sure that your project does not depend on a package with known security issues? The SensioLabs security advisories checker is a simple tool, available as a web service or as an online application, that uses the information from your composer.lock file to check for known security vulnerabilities. This checker is a frontend for the security advisories database.
Check your PHP project for known security issues - SensioLabs Security Advisories Checker
Threat Risk Modeling - OWASP
Threat Risk Modeling - OWASP
When you start a web application design, it is essential to apply threat risk modeling; otherwise you will squander resources, time, and money on useless controls that fail to focus on the real risks.The method used to assess risk is not nearly as important as actually performing a structured threat risk modeling. Microsoft notes that the single most important factor in their security improvement program was the corporate adoption of threat risk modeling.OWASP recommends Microsoft’s threat modeling process because it works well for addressing the unique challenges facing web application security and is simple to learn and adopt by designers, developers, code reviewers, and the quality assurance team.The following sections provide some overview information (or see Section 6.9, Further Reading, for additional resources).
Threat Risk Modeling - OWASP
Graudit - Just Another Hacker
Graudit - Just Another Hacker
Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. It's comparable to other static analysis applications like RATS, SWAAT and flaw-finder while keeping the technical requirements to a minimum and being very flexible.
Graudit - Just Another Hacker
Ralph Schindler - Dynamic Assertions for Zend_Acl in ZF
Ralph Schindler - Dynamic Assertions for Zend_Acl in ZF
Zend_Acl can now be used to make concise, dynamic and expressive ACL systems. The assertion system that is in place in Zend_Acl can be leveraged in ways never seen before out of the box. While the User/BlogPost example is on the simple side, you can use this article to start thinking about the different ways such a system can be leveraged in your own projects where dynamic assertions would simplify controller or model code that is already in place.
Ralph Schindler - Dynamic Assertions for Zend_Acl in ZF
ratproxy - Google Code
ratproxy - Google Code
A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.
ratproxy - Google Code
owasp-esapi-php - Google Code
owasp-esapi-php - Google Code
The purpose of the ESAPI is to provide a simple interface that provides all the security functions a developer is likely to need in a clear, consistent, and easy to use way. The ESAPI architecture is very simple, just a collection of classes that encapsulate the key security operations most applications need.
owasp-esapi-php - Google Code