MIRO - Merge it robot!
☆25Feb 23, 2021Updated 5 years ago
Alternatives and similar repositories for Miro
Users that are interested in Miro are comparing it to the libraries listed below
Sorting:
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- ☆25Mar 28, 2018Updated 7 years ago
- An open source, git-ops, zero-trust secret encryption and decryption solution for Kubernetes applications☆935Sep 28, 2023Updated 2 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated last week
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Lambda Extension for iamlive☆42May 17, 2021Updated 4 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆11Oct 30, 2019Updated 6 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Updated this week
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- token exchange as a service☆11Feb 23, 2026Updated last week
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated last week
- An example code to see how integrate Karma with VSCode debugger.☆10Apr 2, 2017Updated 8 years ago
- ☆14Jan 8, 2026Updated last month
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆38Oct 23, 2025Updated 4 months ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 3 years ago
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated 2 weeks ago
- Safety philosopy: example principles for an organization and management☆13Apr 14, 2025Updated 10 months ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- A GitHub Action that helps remove GHAS Licences☆12Jul 15, 2024Updated last year
- ☆32Feb 23, 2026Updated last week
- Chat app for Android that supports answers from multiple LLMs at once. Bring your own API key AI client. Supports OpenAI, Anthropic, Goog…☆13Oct 30, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- Manage your AWS SSM parameters☆16Jul 26, 2019Updated 6 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- Demo - how to easily build security testing for Web App, using Zap and Glue☆61Apr 26, 2021Updated 4 years ago
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆52Oct 28, 2025Updated 4 months ago
- Gather all external facing AWS Services and run it through nmap☆13Feb 3, 2022Updated 4 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- An authentication API based on AWS Cognito☆20Feb 6, 2026Updated 3 weeks ago
- A tool for identifying misconfigured CloudFront domains☆17Apr 27, 2018Updated 7 years ago
- I train a model using TensorFlow to detect the suit and number of a playing card. I created my own dataset by taking pictures of each car…☆14Aug 6, 2020Updated 5 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago