docker
Agent Builder and Runtime by Docker Engineering. Contribute to docker/cagent development by creating an account on GitHub.
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
The Actions Runner Controller (ARC) 0.12.0 release introduces several enhancements including: public preview support for Red Hat OpenShift Kubernetes clusters and vault-based secret management, improvements to Docker-in-Docker (DinD) container mode,…
Wireshark for Docker containers. Contribute to subtrace/subtrace development by creating an account on GitHub.
Like Heroku, but you own it.
Self-hostable clone of lazydocker for the web. Manage your Docker fleet with ease - will-moss/isaiah
Dockerized local and offline backing up of PostgresQL with rotation and compression. - efrecon/pgbackup
In this article, I will present some cool tools that can be used to test and ensure the quality of your Docker image. Tagged with testing, docker.
In the final section of my series on creating a comprehensive security program around Docker [https://nullsweep.com/building-a-docker-security-program], I'll be looking at some ideas and best practices around patching running containers.
In the previous articles, I talked about running static analysis on containers [https://nullsweep.com/docker-static-analysis-with-clair] and rolling
This year at Microsoft Build, Docker will blend developer experience, security, and AI innovation with our latest product announcements. Whether you attend in person at the Seattle Convention Center or tune in online, you’ll see how Docker is redefining the way teams build, secure, and scale modern applications. Docker’s Vision for Developers At Microsoft Build...
A tool for exploring each layer in a docker image. Contribute to wagoodman/dive development by creating an account on GitHub.
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.