IBM / detect-secretsLinks
An enterprise friendly way of detecting and preventing secrets in code.
☆83Updated 3 months ago
Alternatives and similar repositories for detect-secrets
Users that are interested in detect-secrets are comparing it to the libraries listed below
Sorting:
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆112Updated last year
- ChaoSlingr: Introducing Security into Chaos Testing☆69Updated 6 years ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Updated 3 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated 3 months ago
- ☆29Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated 2 years ago
- ☆51Updated 5 years ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 4 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆35Updated last year
- OWASP Foundation Web Respository☆56Updated 3 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆49Updated 4 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Updated last month
- Demos for several kubernetes security features☆64Updated last year
- A Security Results Viewer for the web with storage, teams and history☆35Updated 3 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆101Updated 5 years ago
- Like the unix tree command but for GCP Org Heirarchy☆27Updated 4 years ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- ☆27Updated 3 years ago
- ☆10Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆44Updated 4 months ago
- A Python client for the Snyk API.☆98Updated last year
- ☆41Updated 5 years ago
- a tool to audit the istio service mesh☆174Updated 4 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- ZAP Management Scripts☆23Updated 3 weeks ago
- All Aqua deployments options and aquactl configuration☆63Updated last week
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Darkbit Cloud Security Tools☆25Updated 5 years ago
- ☆74Updated 5 years ago