Skip to content

Commit

Permalink
Merge pull request #47 from theredguild/docs-readme-motd
Browse files Browse the repository at this point in the history
Readme now sorts tool by alphabetical order
  • Loading branch information
mattaereal authored Oct 18, 2024
2 parents 1f51ec2 + 5833c70 commit 4e4eda9
Show file tree
Hide file tree
Showing 2 changed files with 49 additions and 109 deletions.
137 changes: 39 additions & 98 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,101 +35,42 @@ Well, go to **[how to use the tools inside](./HOWTO.md)** to understand how each

### Tools included in this repository

- [x] GitHub analysis (fake profiles, OSINT):
- [x] gitxray: A multifaceted security tool that leverages Public GitHub REST APIs for OSINT,
Forensics, Pentesting and more. (<https://github.com/kulkansecurity/gitxray>)
- [x] gh-fake-analyzer: Dump github profile data for analysis.
(<https://github.com/shortdoom/gh-fake-analyzer/tree/main>)

- [x] Only Secrets:
- Previous to commit:
- [x] git-secrets: Works along with git, preventing secrets from being pushed to a repo.
(<https://github.com/awslabs/git-secrets>)
- Post commit:
- [x] trufflehog: Find, verify, and analyze leaked credentials.
(<https://github.com/trufflesecurity/trufflehog>) [Easy
marketplace](https://github.com/marketplace/actions/trufflehog-oss)
- [x] gitleaks: Protect and discover secrets. (<https://github.com/gitleaks/gitleaks>) Also
[git-leaks-action](https://github.com/gitleaks/gitleaks-action)
- [x] 2ms: Too many secrets (2MS) helps people protect their secrets on any file or on
systems like CMS, chats and git. (<https://github.com/Checkmarx/2ms>)
- [x] detect-secrets: yet another one. (<https://github.com/Yelp/detect-secrets>)

- [x] Vulnerability scanners:
- [x] trivy: Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes,
code repositories, clouds and more. (<https://github.com/aquasecurity/trivy>)
- [x] clair: Vulnerability Static Analysis for Containers. (<https://github.com/quay/clair>)
- [x] snyk: Snyk CLI scans and monitors your projects for security vulnerabilities.
(<https://github.com/snyk/cli>)
- [x] grype: A vulnerability scanner for container images and filesystems.
(<https://github.com/anchore/grype/>)
- [x] falco: Cloud Native Runtime Security. (<https://github.com/falcosecurity/falco>)

- [x] Static analysis:
- [x] semgrep: Lightweight static analysis for many languages.
(<https://github.com/semgrep/semgrep>)
- [x] docker-compose (<https://semgrep.dev/p/docker-compose>)
- [x] dockerfile (<https://semgrep.dev/p/dockerfile>)
- [x] kubernetes (<https://semgrep.dev/p/kubernetes>)
- [x] flawfinder (<https://semgrep.dev/p/flawfinder>)
- [x] ~~sast-scan: Scan is a free & Open Source DevSecOps tool for performing static analysis
based security testing of your applications and its dependencies. CI and Git friendly.
(<https://github.com/marksarka/sast-scan>)~~ Momentarily removed.

- [x] Misconfigurations:
- [x] legitify: Detect and remediate misconfigurations and security risks across all your GitHub
and GitLab assets. (<https://github.com/Legit-Labs/legitify>)
- [x] kics: Find security vulnerabilities, compliance issues, and infrastructure
misconfigurations early in the development cycle of your infrastructure-as-code.
(<https://github.com/Checkmarx/kics>) [Scan free](https://kics.checkmarx.net/) up to 4mb
repositories.

- [x] GitHub actions:
- [x] harden-runner: Network egress filtering and runtime security for GitHub-hosted and
self-hosted runners. (<https://github.com/step-security/harden-runner>)
- [x] secure-repo: Orchestrate GitHub Actions Security.
(<https://github.com/step-security/secure-repo>)
- [x] wait-for-secrets: 2fa for GHA. (<https://github.com/step-security/wait-for-secrets>)
- [x] generic: A set of GitHub actions for checking your projects for vulnerabilities.
(<https://github.com/snyk/actions>)
- [x] and many many more from each of the listed tools you see.

- [x] Container and/or cloud specific:
- [x] kube-bench: Checks whether Kubernetes is deployed according to security best practices as
defined in the CIS Kubernetes Benchmark. (<https://github.com/aquasecurity/kube-bench>) (included inside Trivy)
- [x] checkov: Prevent cloud misconfigurations and find vulnerabilities during build-time in
infrastructure as code, container images and open source packages.
(<https://github.com/bridgecrewio/checkov>)
- [x] scoutsuite: Multi-Cloud Security Auditing Tool. (<https://github.com/nccgroup/ScoutSuite>)
- [x] Cloudsplaining: AWS IAM assessment tool (<https://github.com/salesforce/cloudsplaining>)
- [x] hadolint: Dockerfile linter. (<https://github.com/hadolint/hadolint>)
- [x] dockle: Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start. (<https://github.com/goodwithtech/dockle>)

- [x] Dependency & lib checkers:
- [x] DependencyCheck: OWASP dependency-check is a software composition analysis utility that
detects publicly disclosed vulnerabilities in application dependencies.
(<https://github.com/jeremylong/DependencyCheck>)
- [x] retirejs: Scanner detecting the use of JavaScript libraries with known vulnerabilities.
(<https://github.com/RetireJS/retire.js>)
- [x] npm audit: This built-in npm command checks for vulnerabilities in your installed
packages.
- [x] installed-check: Verifies that installed modules comply with the requirements specified in
package.json. (<https://www.npmjs.com/package/installed-check>)
- [x] better-npm-audit: Provides additional features on top of the existing npm audit options.
(<https://www.npmjs.com/package/better-npm-audit>)
- [x] eslint-plugin-security: ESLint rules for Node Security.
(<https://www.npmjs.com/package/eslint-plugin-security>)
- [x] eslint-plugin-no-unsanitized: Custom ESLint rule to disallow unsafe innerHTML, outerHTML,
insertAdjacentHTML and alike. (<https://www.npmjs.com/package/eslint-plugin-no-unsanitized>)
- [x] eslint-plugin-no-secrets: An ESLint plugin to find strings that might be
secrets/credentials. (<https://www.npmjs.com/package/eslint-plugin-no-secrets>)
- [x] node-version-audit: Node Version Audit is a tool to check Node.js version against a
regularly updated list of CVE exploits, new releases, and end of life dates.
(<https://www.npmjs.com/package/node-version-audit>)
- [x] yarn-audit-fix: The missing yarn audit fix. (<https://www.npmjs.com/package/yarn-audit-fix>)
- [x] better-npm-audit: Additional features on top of the existing npm audit options.
(<https://www.npmjs.com/package/better-npm-audit>)
- [x] nodejsscan: A static security code scanner for Node.js applications.
(<https://github.com/ajinabraham/NodeJsScan>)
- [x] lavamoat: Tools for sandboxing your dependency graph.
(<https://github.com/LavaMoat/lavamoat>)
- [x] 2ms: Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats, and git. (<https://github.com/Checkmarx/2ms>)
- [x] better-npm-audit: Provides additional features on top of the existing npm audit options. (<https://www.npmjs.com/package/better-npm-audit>)
- [x] checkov: Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images, and open-source packages. (<https://github.com/bridgecrewio/checkov>)
- [x] clair: Vulnerability Static Analysis for Containers. (<https://github.com/quay/clair>)
- [x] Cloudsplaining: AWS IAM assessment tool. (<https://github.com/salesforce/cloudsplaining>)
- [ ] cloudsploit: AWS security scanning and monitoring tool for detecting threats and misconfigurations. (<https://github.com/aquasecurity/cloudsploit>)
- [x] DependencyCheck: OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies. (<https://github.com/jeremylong/DependencyCheck>)
- [x] detect-secrets: yet another one. (<https://github.com/Yelp/detect-secrets>)
- [x] dockle: Container Image Linter for Security, helping build the Best-Practice Docker Image, easy to start. (<https://github.com/goodwithtech/dockle>)
- [x] eslint-plugin-no-secrets: An ESLint plugin to find strings that might be secrets/credentials. (<https://www.npmjs.com/package/eslint-plugin-no-secrets>)
- [x] eslint-plugin-no-unsanitized: Custom ESLint rule to disallow unsafe innerHTML, outerHTML, insertAdjacentHTML, and alike. (<https://www.npmjs.com/package/eslint-plugin-no-unsanitized>)
- [x] eslint-plugin-security: ESLint rules for Node Security. (<https://www.npmjs.com/package/eslint-plugin-security>)
- [x] falco: Cloud Native Runtime Security. (<https://github.com/falcosecurity/falco>)
- [x] generic: A set of GitHub actions for checking your projects for vulnerabilities. (<https://github.com/snyk/actions>)
- [x] gh-fake-analyzer: Dump github profile data for analysis. (<https://github.com/shortdoom/gh-fake-analyzer/tree/main>)
- [x] git-secrets: Works along with git, preventing secrets from being pushed to a repo. (<https://github.com/awslabs/git-secrets>)
- [x] gitxray: A multifaceted security tool that leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting, and more. (<https://github.com/kulkansecurity/gitxray>)
- [x] gitleaks: Protect and discover secrets. (<https://github.com/gitleaks/gitleaks>)
- [x] grype: A vulnerability scanner for container images and filesystems. (<https://github.com/anchore/grype/>)
- [x] harden-runner: Network egress filtering and runtime security for GitHub-hosted and self-hosted runners. (<https://github.com/step-security/harden-runner>)
- [x] hadolint: Dockerfile linter. (<https://github.com/hadolint/hadolint>)
- [x] installed-check: Verifies that installed modules comply with the requirements specified in package.json. (<https://www.npmjs.com/package/installed-check>)
- [x] kics: Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code. (<https://github.com/Checkmarx/kics>)
- [x] kube-bench: Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark. (<https://github.com/aquasecurity/kube-bench>)
- [x] lavamoat: Tools for sandboxing your dependency graph. (<https://github.com/LavaMoat/lavamoat>)
- [x] legitify: Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets. (<https://github.com/Legit-Labs/legitify>)
- [x] node-version-audit: Node Version Audit is a tool to check Node.js version against a regularly updated list of CVE exploits, new releases, and end of life dates. (<https://www.npmjs.com/package/node-version-audit>)
- [x] nodejsscan: A static security code scanner for Node.js applications. (<https://github.com/ajinabraham/NodeJsScan>)
- [x] npm audit: This built-in npm command checks for vulnerabilities in your installed packages.
- [ ] prowler: AWS security best practices assessment, auditing, hardening, and incident response tool. (<https://github.com/prowler-cloud/prowler>)
- [x] retirejs: Scanner detecting the use of JavaScript libraries with known vulnerabilities. (<https://github.com/RetireJS/retire.js>)
- [x] scoutsuite: Multi-Cloud Security Auditing Tool. (<https://github.com/nccgroup/ScoutSuite>)
- [x] secure-repo: Orchestrate GitHub Actions Security. (<https://github.com/step-security/secure-repo>)
- [x] semgrep: Lightweight static analysis for many languages. (<https://github.com/semgrep/semgrep>)
- [x] snyk: Snyk CLI scans and monitors your projects for security vulnerabilities. (<https://github.com/snyk/cli>)
- [x] trivy: Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds, and more. (<https://github.com/aquasecurity/trivy>)
- [x] trufflehog: Find, verify, and analyze leaked credentials. (<https://github.com/trufflesecurity/trufflehog>) [Easy marketplace] (https://github.com/marketplace/actions/trufflehog-oss)
- [x] wait-for-secrets: 2fa for GHA. (<https://github.com/step-security/wait-for-secrets>)
- [x] yarn-audit-fix: The missing yarn audit fix. (<https://www.npmjs.com/package/yarn-audit-fix>)
21 changes: 10 additions & 11 deletions motd
Original file line number Diff line number Diff line change
@@ -1,17 +1,16 @@
__ __ _
\ \ / /__| | ___ ___ _ __ ___ ___
\ \ /\ / / _ \ |/ __/ _ \| '_ ` _ \ / _ \
\ V V / __/ | (_| (_) | | | | | | __/
__ \_/\_/ \___|_|\___\___/|_| |_| |_|\___|
__ __ _
\ \ / /__| | ___ ___ _ __ ___ ___
\ \ /\ / / _ \ |/ __/ _ \| '_ ` _ \ / _ \
\ V V / __/ | (_| (_) | | | | | | __/
__ \_/\_/ \___|_|\___\___/|_| |_| |_|\___|
\ \ / /_ _ _ __ __| | ___ _ __ ___ _ __
\ \ /\ / / _` | '_ \ / _` |/ _ \ '__/ _ \ '__|
\ V V / (_| | | | | (_| | __/ | | __/ |
\_/\_/ \__,_|_| |_|\__,_|\___|_| \___|_|
\ V V / (_| | | | | (_| | __/ | | __/ |
\_/\_/ \__,_|_| |_|\__,_|\___|_| \___|_|

Welcome to the devsecops toolkit
Built by The Red Guild 🪷

This container was created as a resource for a workshop,
which intends to spread awareness, help people protect themselves
and the repos they interact with. Say hi @theredguild!, don't be a stranger.

This container was created as a resource for a workshop,
which intends to spread awareness, help people protect themselves
and the repos they interact with. Say hi @theredguild!, don't be a stranger.

0 comments on commit 4e4eda9

Please sign in to comment.