Container Security Verification Standard
☆36Mar 28, 2019Updated 6 years ago
Alternatives and similar repositories for csvs
Users that are interested in csvs are comparing it to the libraries listed below
Sorting:
- ☆10May 12, 2022Updated 3 years ago
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 3 months ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated 2 weeks ago
- ☆12Feb 18, 2021Updated 5 years ago
- A terraform module to create a VPC with secure default configurations.☆17Jan 18, 2022Updated 4 years ago
- Bridge services dedicated to keycloak interactions☆17Updated this week
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 3 weeks ago
- ☆17Dec 14, 2021Updated 4 years ago
- An OPA library to develop IT Control policies, for the IBM Cloud☆17Sep 26, 2022Updated 3 years ago
- Lockheed Martin developed utility to compare two CycloneDX SBOMs☆19Oct 21, 2021Updated 4 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- ☆17Jan 23, 2021Updated 5 years ago
- Flexible onboarding and routing of IoT devices to any IoT Core account and region using a QR code.☆22Sep 21, 2023Updated 2 years ago
- An example that controls IAM users who can access KMS key with the IAM group☆21Feb 15, 2017Updated 9 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆54Feb 15, 2023Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- Making CoreOS' Clair easily work in CI/CD pipelines☆29Sep 10, 2023Updated 2 years ago
- Use AWS X-Ray to reach Least Privilege☆72Mar 11, 2019Updated 6 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Jun 18, 2019Updated 6 years ago
- Amazon WAF Security Automation deployment (modular with Terraform)☆73Dec 7, 2018Updated 7 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆28Feb 4, 2022Updated 4 years ago
- Reliable Keycloak user migration at scale. Features include bounded concurrency, durable retries, and zero data loss.☆31Jan 13, 2026Updated last month
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- Telegram Widget Authenticator For Keycloak☆13Dec 20, 2025Updated 2 months ago
- Executive coaching skill for planning your 2026 using research-backed process goals. Works with Claude Code and Claude.ai.