Home/Free Container Security Tools

Free Container Security Tools

Secure containers and Kubernetes clusters with free and open source tools. Browse container image scanners, runtime security, Kubernetes policy enforcement, and supply chain security tools.

269 tools·30 sub-categories·Updated April 2026

Showing 24 of 269 tools

portainer icon

portainer

portainer/portainer

Tool

Making Docker and Kubernetes management easy.

33.2K
10 months ago
slim icon

slim

slimtoolkit/slim

Tool

Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)

22.7K
3 months ago
kubescape icon

kubescape

kubescape/kubescape

Tool

Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.

11.1K
3 months ago
kube-bench icon

kube-bench

aquasecurity/kube-bench

Tool

Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark

7.9K
about 1 month ago
kubernetes-learning-path icon

kubernetes-learning-path

techiescamp/kubernetes-learning-path

Educational Resource

A roadmap to learn Kubernetes from scratch (Beginner to Advanced level)

7.4K
about 1 month ago
kata-containers icon

kata-containers

kata-containers/kata-containers

Framework

Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/

7.3K
3 months ago
podman-desktop icon

podman-desktop

podman-desktop/podman-desktop

Tool

Podman Desktop is the best free and open source tool to work with Containers and Kubernetes for developers. Get an intuitive and user-friendly interface to effortlessly build, manage, and deploy containers and Kubernetes — all from your desktop.

5.9K
10 months ago
cri-o icon

cri-o

cri-o/cri-o

Tool

Open Container Initiative-based implementation of Kubernetes Container Runtime Interface

5.4K
10 months ago
kubernetes-goat icon

kubernetes-goat

madhuakula/kubernetes-goat

Educational Resource

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

5.4K
about 1 month ago
lxc icon

lxc

lxc/lxc

Tool

LXC - Linux Containers

4.9K
10 months ago
kube-hunter icon

kube-hunter

aquasecurity/kube-hunter

Tool

Hunt for security weaknesses in Kubernetes clusters

4.9K
10 months ago
pouch icon

pouch

AliyunContainerService/pouch

Tool

An Efficient Enterprise-class Container Engine

4.7K
8 months ago
diun icon

diun

crazy-max/diun

Tool

Receive notifications when an image is updated on a Docker registry

3.7K
10 months ago
krustlet icon

krustlet

krustlet/krustlet

Tool

Kubernetes Rust Kubelet

3.6K
10 months ago
kubernetes-client icon

kubernetes-client

fabric8io/kubernetes-client

Library/SDK

Java client for Kubernetes & OpenShift

3.5K
10 months ago
nsjail icon

nsjail

google/nsjail

Tool

A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kafel BPF language for enhanced security.

3.4K
8 months ago
SecretScanner icon

SecretScanner

deepfence/SecretScanner

Tool

:unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock:

3.3K
about 2 months ago
dockle icon

dockle

goodwithtech/dockle

Tool

Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start

3.1K
5 months ago
kube-score icon

kube-score

zegl/kube-score

Tool

Kubernetes object analysis with recommendations for improved reliability and security. kube-score actively prevents downtime and bugs in your Kubernetes YAML and Charts. Static code analysis for Kubernetes.

3.0K
3 months ago
kubernetes-security-best-practice icon

kubernetes-security-best-practice

freach/kubernetes-security-best-practice

Documentation

Kubernetes Security - Best Practice Guide

2.7K
8 months ago
compose-spec icon

compose-spec

compose-spec/compose-spec

Documentation

The Compose specification

2.5K
10 months ago
kube-capacity icon

kube-capacity

robscott/kube-capacity

Tool

A simple CLI that provides an overview of the resource requests, limits, and utilization in a Kubernetes cluster

2.4K
10 months ago
kopf icon

kopf

nolar/kopf

Framework

A Python framework to write Kubernetes operators in just a few lines of code

2.3K
10 months ago
kubectl-debug icon

kubectl-debug

aylei/kubectl-debug

Tool

This repository is no longer maintained, please checkout https://github.com/JamesTGrant/kubectl-debug.

2.3K
10 months ago

Can't find the right tool?

Describe what you need in plain English and our AI will find the best match from 10,000+ security tools.

Frequently Asked Questions

What is the best free container image scanner?

Trivy is the most widely used free container image vulnerability scanner, covering OS packages, language dependencies, and misconfigurations in a single tool. Grype and Clair are strong alternatives. Snyk Container offers a free tier for individual developers.

How do I secure a Kubernetes cluster?

Key steps include: enable RBAC, use network policies to restrict pod communication, scan images before deployment with Trivy or Grype, enforce pod security standards, use Falco for runtime threat detection, and audit with kube-bench against CIS Kubernetes Benchmarks.

What is Falco?

Falco is an open source cloud-native runtime security tool that detects unexpected behavior in containers and Kubernetes workloads using kernel system call monitoring. It can alert on privilege escalation, unexpected network connections, and file system access in real time.

What is the software supply chain and how do I secure it?

The software supply chain includes all components, dependencies, and processes used to build and deploy software. Attacks like SolarWinds and Log4Shell highlighted supply chain risks. Tools like Syft (SBOM generation), Grype (vulnerability scanning), and Sigstore (artifact signing) help secure the supply chain.