Authentication-Advocate / webauthn-wall-of-shameLinks
A list of vendors who don't allow their customers to adopt WebAuthn and prevent phishing attacks.
☆9Updated last year
Alternatives and similar repositories for webauthn-wall-of-shame
Users that are interested in webauthn-wall-of-shame are comparing it to the libraries listed below
Sorting:
- Go wrapper for awslabs/certlint☆26Updated 5 years ago
- Go wrapper for kroeckx/x509lint☆14Updated 4 years ago
- A low-cost Certificate Transparency log for deployment in the cloud.☆39Updated 9 months ago
- ☆16Updated 10 months ago
- TACOS framework structural details☆20Updated last month
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆17Updated 2 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated this week
- The Great Multi-Factor Authentication (MFA) Distribution Project of the Open Source Security Foundation (OpenSSF). We work to distribute …☆54Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- OCSP Responder monitor☆37Updated 10 months ago
- ☆26Updated 2 weeks ago
- ☆24Updated 9 months ago
- An easy way to give all your EC2 instances SSH host certificates☆16Updated 2 years ago
- Website for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆21Updated 4 months ago
- Yubico OTP validation Slack bot☆10Updated 8 months ago
- Windows Automatic Root Update History☆29Updated 3 weeks ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Repository for the Enterprise Certificate Proxy project.☆25Updated 3 months ago
- Tool to check X509 certificates☆73Updated 4 years ago
- Certificate Revocation List monitor☆42Updated 10 months ago
- TPM 2.0 TSS keyfile library☆14Updated last month
- VSCode Extension for Deciduous☆9Updated 6 months ago
- Example Express application for collecting data from the Stethoscope app☆14Updated 7 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Home for explainer documents originated by the Microsoft Identity Standards team☆16Updated last year
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- Oblivious HTTP implementation☆28Updated last year
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- Home of code related to security of network systems.☆25Updated 5 months ago
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆13Updated last week