☆58Mar 16, 2026Updated last week
Alternatives and similar repositories for justtrustme
Users that are interested in justtrustme are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utility for bulk image, license, package, and vulnerability discovery in containerize workloads on GCP. Includes CLI and Service with cus…☆13Feb 15, 2024Updated 2 years ago
- ☆24May 31, 2024Updated last year
- ☆26Aug 31, 2023Updated 2 years ago
- Comparison of Chainguard Images to others☆21Updated this week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Feb 26, 2026Updated 3 weeks ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- ☆12Oct 17, 2023Updated 2 years ago
- Demos and resources of the Istio + Gatekeeper talks at IstioCon 2022 and GitOpsCon 2022☆14Sep 4, 2023Updated 2 years ago
- Docker image packaging and publishing for the Microsoft build of Go☆21Updated this week
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 10 months ago
- vexctl is a tool to attest VEX impact statements☆45Mar 27, 2023Updated 2 years ago
- Fairwinds Base Image Finder CLI☆39Updated this week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Oct 30, 2023Updated 2 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Jan 24, 2023Updated 3 years ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- ☆58Jun 1, 2022Updated 3 years ago
- Collection of tools for producing and exploring OmniBOR data.☆22Oct 31, 2024Updated last year
- Lambda function for verifying signed images in ECS☆37Mar 9, 2024Updated 2 years ago
- A functional type system for policy inspection, audit and enforcement.☆14Aug 17, 2023Updated 2 years ago
- ☆11Aug 15, 2024Updated last year
- RATS Architecture☆17Oct 27, 2025Updated 4 months ago
- Helm Chart for deploying GUAC☆18Mar 9, 2026Updated 2 weeks ago
- IETF RATS terms cheat sheet☆12Feb 4, 2023Updated 3 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆36Dec 5, 2025Updated 3 months ago
- AWS SSO Reporter☆55May 7, 2025Updated 10 months ago
- Transparenty Immutable Container Image Tags☆20Jul 5, 2023Updated 2 years ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- Sets up Open Policy Agent CLI in your GitHub Actions workflow.☆55Jan 12, 2026Updated 2 months ago
- Tool to interact with Docker registry objects.☆25Nov 6, 2025Updated 4 months ago
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆145Mar 13, 2026Updated last week
- This repository hosts the admission controller build on top of grype.☆20Jun 11, 2025Updated 9 months ago
- This Guidance helps customers assess their foundational security setup in their AWS account☆24Oct 19, 2024Updated last year
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Nov 8, 2023Updated 2 years ago