Open-Source Projects
Discover top open-source software, updated regularly with real-world adoption signals.
Discover top open-source software, updated regularly with real-world adoption signals.

Runtime threat detection and attack path visualization for cloud-native workloads
ThreatMapper continuously scans containers, serverless functions, and cloud configurations, ranks risks, and visualizes attack paths to help teams prioritize remediation across Kubernetes, Docker, ECS, Fargate, and bare-metal environments.
Prioritize vulnerable containers in a Kubernetes cluster
Reduced exposure by fixing highest‑risk images first
Identify misconfigurations across AWS, Azure, and GCP
Remediate compliance gaps and prevent attack vectors
Detect secret leakage in serverless Fargate workloads
Protect sensitive credentials and avoid data breaches
Provide unified security observability for on‑prem VMs
Gain a single view of threats across physical and virtual assets
Kubernetes, Docker, Amazon ECS, AWS Fargate, and bare‑metal or virtual machines.
It can be launched with a Docker‑Compose file on a single host or installed in a Kubernetes cluster via Helm.
ThreatMapper uses both agent‑based sensors for detailed telemetry and agent‑less Cloud Scanner tasks for cloud‑API based checks.
Yes, ThreatStryker is the enterprise offering with additional features and support.
Apache‑2.0.
Project at a glance
StableLast synced 4 days ago