claroty / jwthenticator
A cloud first service for key to JWT authentication library and server written in Python 3
☆19Updated 2 weeks ago
Alternatives and similar repositories for jwthenticator:
Users that are interested in jwthenticator are comparing it to the libraries listed below
- A tool to create network tunnels over HTTP/S written in Python 3☆33Updated last month
- A thin async wrapper for SQLAlchemy sessions☆10Updated 3 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- This GitHub Action installs, configures & runs Redefine to optimize CI execution time and resources.☆21Updated 6 months ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆26Updated 2 years ago
- Docker Secure Computing Profile Generator☆47Updated 3 years ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Easily sync open-policy rules to your feature toggles☆126Updated 6 months ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 3 years ago
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆10Updated 4 years ago
- INTERCEPT / Policy as Code Auditing & Compliance☆83Updated last week
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Modron - Cloud security compliance☆33Updated last month
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated last year
- Security scanning & static analysis tool☆93Updated 3 months ago
- ☆27Updated 2 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code securi…☆76Updated 5 months ago
- Manage network policies, AWS, GCP & Azure IAM policies, Istio Authorization Policies, and Kafka ACLs in a Kubernetes cluster with ease.☆296Updated this week
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆65Updated last month
- ☆74Updated 4 years ago
- ☆21Updated 5 years ago
- Build custom Docker seccomp profiles for containers by finding syscalls it uses.☆89Updated 4 years ago
- ☆11Updated last month
- TLS Tracing examples using eBPF against the OpenSSL Library☆14Updated 2 years ago