IBM / detect-secretsLinks
An enterprise friendly way of detecting and preventing secrets in code.
☆81Updated 2 weeks ago
Alternatives and similar repositories for detect-secrets
Users that are interested in detect-secrets are comparing it to the libraries listed below
Sorting:
- ChaoSlingr: Introducing Security into Chaos Testing☆68Updated 6 years ago
- ☆51Updated 5 years ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated 8 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated 2 weeks ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Like the unix tree command but for GCP Org Heirarchy☆27Updated 4 years ago
- GitGoat is an open source tool that was built to enable DevOps and Engineering teams to design and implement a sustainable misconfigurati…☆170Updated 8 months ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆209Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆44Updated last month
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- OWASP Kubernetes Security Testing Guide☆38Updated last week
- ☆102Updated 8 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 4 years ago
- OWASP Foundation Web Respository☆56Updated 2 weeks ago
- Links and resources for the O'Reilly Kubernetes Security book☆99Updated 4 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated this week
- ☆27Updated 3 weeks ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆24Updated 12 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Demos for several kubernetes security features☆64Updated 9 months ago
- Offensive Terraform Website☆45Updated 5 years ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Kubernetes Easter CTF☆59Updated 5 years ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Unit testing framework for test driven security of AWS, GCP, Heroku and more.☆108Updated last year
- docker image with useful network and container tools and SSH☆68Updated 10 months ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Updated 3 years ago