containers
subtrace/subtrace
https://github.com/subtrace/subtrace
Wireshark for Docker containers. Contribute to subtrace/subtrace development by creating an account on GitHub.
Added 1 month ago
FreeBSD 14.2 wants to woo Docker fans but still struggles with Wi-Fi
https://www.theregister.com/2024/12/05/freebsd_142/
Another buzzword box ticked: OCI-compliant containers
Added 1 month ago
firecracker-microvm/firecracker
https://github.com/firecracker-microvm/firecracker
Secure and fast microVMs for serverless computing. - firecracker-microvm/firecracker
Added 1 month ago
aurae-runtime/aurae: Distributed systems runtime daemon written in Rust.
https://github.com/aurae-runtime/aurae
Distributed systems runtime daemon written in Rust. - aurae-runtime/aurae
Added 1 month ago
Container security best practices: Ultimate guide - Sysdig
https://sysdig.com/blog/container-security-best-practices/
Sticking to container security best practices is critical for successfully delivering secure software.
Added 1 month ago
How to build a CI/CD pipeline for container vulnerability scanning with Tri
https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/
In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]
Added 1 month ago
Dive: A tool for exploring a Docker image layer contents and more
https://github.com/wagoodman/dive
A tool for exploring each layer in a docker image. Contribute to wagoodman/dive development by creating an account on GitHub.
Added 1 month ago
netstat without netstat · Staaldraad
https://staaldraad.github.io/2017/12/20/netstat-without-netstat/
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
Added 1 month ago