ab / oncelerLinks
Onceler listens to your secrets and shares them exactly once.
☆22Updated 3 weeks ago
Alternatives and similar repositories for onceler
Users that are interested in onceler are comparing it to the libraries listed below
Sorting:
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- read the docs version of risk management☆26Updated 2 years ago
- Prevent leaks with gitleaks, and use tests to validate☆32Updated 5 months ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 4 months ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 3 weeks ago
- Posture Attribute Collection and Evaluation☆24Updated 2 years ago
- Python client and module for Vulnerability-Lookup.☆13Updated last week
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated last year
- Global Security Database Tools☆43Updated last year
- ☆17Updated 5 years ago
- ☆16Updated 4 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆17Updated 2 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- ☆31Updated 4 months ago
- Parse greppable Nmap output as a tree☆14Updated 2 years ago
- ☆14Updated 4 months ago
- Global Security Database Project☆28Updated 2 years ago
- Example OpenID Connect relying party as a Sinatra app☆35Updated 2 weeks ago
- honest.security microsite☆41Updated 5 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year
- Chrome extension that disables WebBluetooth☆14Updated 7 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆36Updated this week
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last week
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated this week
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Probing a network for Ubiquiti devices and parsing responses☆19Updated 9 years ago