MeneDev / yubi-oath-vpnLinks
Simply insert your Yubikey and connect automatically to your TOTP-2FA-VPN.
☆16Updated last month
Alternatives and similar repositories for yubi-oath-vpn
Users that are interested in yubi-oath-vpn are comparing it to the libraries listed below
Sorting:
- DNSmetrics connects to your accounts at multiple managed DNS providers using their APIs and emits standardized metrics in statsd format f…☆14Updated 6 years ago
- Hugo repository for main ironpeak.be website.☆12Updated 2 months ago
- proof-of-concept for recovering the master key from a Hashicorp Vault process☆69Updated 2 years ago
- Container Security Verification Standard☆36Updated 6 years ago
- ☆34Updated 6 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Enable Falco to read audit logs from EKS☆11Updated 5 years ago
- Shell wrapper to run a login shell with `sudo` as the current user for the purpose of audit logging☆95Updated 3 years ago
- Go package for working with SSLLabs API☆19Updated last week
- The Container Security Book—a free book for practitioners☆82Updated 5 years ago
- A Dockerfile that creates an image with known vulnerabilities.☆50Updated 3 years ago
- Offensive Infrastructure with Modern Technologies☆91Updated 5 years ago
- Darkbit Cloud Security Tools☆25Updated 5 years ago
- The command-line client for Journal☆13Updated last year
- Making CoreOS' Clair easily work in CI/CD pipelines☆29Updated 2 years ago
- An easy way to give all your EC2 instances SSH host certificates☆16Updated 2 years ago
- Hardened debian linux baseimage for Docker.☆41Updated 2 years ago
- Automate SSH key management☆66Updated 3 years ago
- Github Audit Tool for Organizations☆37Updated 5 months ago
- Example Express application for collecting data from the Stethoscope app☆14Updated 7 years ago
- ☆12Updated 4 years ago
- A tool for getting SSH keys out of LDAP☆50Updated 3 years ago
- Marking instances dirty since 2018☆47Updated 6 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Updated last week
- Create, modify and destroy ZeroTier networks and members through Terraform.☆130Updated 5 years ago
- A serverless SSH certificate authority to control access to machines using IAM and Lambda☆52Updated 7 years ago
- Falco container runtime security extras (default rulesets and more)☆49Updated 6 years ago
- Container Snitch checks running processes under the Docker Engine and alerts if any are found to be running as root☆77Updated 8 years ago
- Terraform to configure an AWS account for the storage of many separate CloudTrails in S3☆14Updated 7 years ago
- Generates TCP/UDP stream configuration files for NGINX based on the backend servers and ports provided☆11Updated 6 years ago