OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations
☆14Sep 4, 2025Updated 6 months ago
Alternatives and similar repositories for OAuch
Users that are interested in OAuch are comparing it to the libraries listed below
Sorting:
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago
- A list of OpenStack Security Best Practices - written in Markdown☆10Apr 8, 2015Updated 10 years ago
- 📦 Shango Deploy | Modern deployment automation tool that simplifies deploying web applications with zero configuration. Supports multipl…☆12Feb 26, 2025Updated last year
- The JetRails 2FA plugin adds an extra layer of security to your Magento store. User based 2FA enablement ensures that admin users are fo…☆11Oct 12, 2024Updated last year
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆15Apr 14, 2025Updated 11 months ago
- ☆14Mar 10, 2026Updated last week
- 🏣 Amazon Web 🏪 Services through 🕍 hands-on 🏘 projects real 🚂 world use cases 🚋 and guided 🚒 tutorials Perfect 🚜 developers ⛸ Dev …☆32May 11, 2025Updated 10 months ago
- Go wrapper for awslabs/certlint☆25Apr 3, 2020Updated 5 years ago
- This project demonstrates deploying a secure, scalable Generative AI (GenAI) solution on Azure using a Retrieval-Augmented Generation (RA…☆18Feb 27, 2025Updated last year
- AI-Powered Code Reviews for Best Practices & Security Issues Across Languages☆21Aug 8, 2025Updated 7 months ago
- AWS multi-account setup via IAC, with scripts for bootstrapping and custom usage☆17Mar 1, 2026Updated 2 weeks ago
- Ansible playbook for setting up a secure and private homelab with multiple machines, following ansible-lint best practices and implementi…☆16Jun 16, 2025Updated 9 months ago
- ☆14Jan 19, 2022Updated 4 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- Simple Azure AI Studio setup following Microsoft's best practices for security and access management☆17Sep 27, 2024Updated last year
- A collection of best practices, research, and tools for enhancing security in Web3 applications. Covers smart contract vulnerabilities, b…☆15Feb 12, 2025Updated last year
- A collection of Docker resources, including comprehensive tools and best practices for container management, monitoring, security, automa…☆17May 30, 2025Updated 9 months ago
- Implementation of mod_security rules and Apache best practices for CentOS 5,6,7☆15May 4, 2017Updated 8 years ago
- ☆11May 16, 2024Updated last year
- Tornado Demo Vulnerable Application to test SQL injection vulnerability and patch it using RASP (Runtime Application Self-Protection)☆11Nov 15, 2017Updated 8 years ago
- NuLink network is a decentralized solution for privacy-preserving applications developers to implement best practices and best of breed s…☆13Oct 30, 2024Updated last year
- 15-minute city script☆17Nov 8, 2025Updated 4 months ago
- Implemented encryption/decryption and signing/verification according to Google's own best security practices.☆19Jun 16, 2023Updated 2 years ago
- A €12 portable bench power supply unit (USB C PD)☆12Dec 1, 2020Updated 5 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- *READY TO USE* Terraform baseline for implementing essential AWS security best practices, including Organizations, SSO, MFA, SCPs, Budget…☆25Nov 2, 2024Updated last year
- A Prometheus blackbox-like thing to probe XMPP services☆12Oct 3, 2021Updated 4 years ago
- Ethical hacking, CTF, tools & etc☆22Feb 13, 2021Updated 5 years ago
- dnspython hook for dehydrated shell script☆12Aug 4, 2022Updated 3 years ago
- fail2ban-subnets aims to provide a way to ban subnets of IPs repeatingly banned by fail2ban for multiple offenses.☆13Jul 25, 2016Updated 9 years ago
- a sqlx wrapper for teal and lua☆14Mar 11, 2026Updated last week
- XMPP account exporter and migrator☆18Oct 17, 2024Updated last year
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- A simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sources☆28Jan 31, 2020Updated 6 years ago
- U:Kit is a smart IoT sensor kit that makes your house safer and gives you the freedom to adapt it to your own needs.☆18Nov 28, 2019Updated 6 years ago
- Best Practices for Deploying X-Road Security Servers on AWS☆19Nov 30, 2023Updated 2 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Finite State Language specification☆10Aug 7, 2022Updated 3 years ago
- Awesome DNS Security is a curated list of tools, best practices, and resources focused on securing DNS infrastructure.