claroty / jwthenticatorLinks
A cloud first service for key to JWT authentication library and server written in Python 3
☆19Updated 2 weeks ago
Alternatives and similar repositories for jwthenticator
Users that are interested in jwthenticator are comparing it to the libraries listed below
Sorting:
- A thin async wrapper for SQLAlchemy sessions☆10Updated 3 years ago
- A tool to create network tunnels over HTTP/S written in Python 3☆35Updated 3 months ago
- The Logger that will prevent your data leak☆100Updated 3 months ago
- The first open-source eBPF sandbox for Python (macOS/Linux): Secure libraries, block RCE, and enforce precise syscall control. Dive into …☆218Updated last week
- By scanning CI/CD misconfigurations, Allero helps reduce production issues, harden your security posture and shift-left CI/CD from DevOps…☆205Updated last year
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆10Updated 4 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- Open source toolkit created to enable easy adoption of software enclaves☆151Updated last month
- ☆21Updated 3 years ago
- ☆21Updated 5 years ago
- WEED - What EEs Different - IAM role diff checker☆61Updated 2 years ago
- Evidence store and policy engine for your Software Supply Chain attestations, SBOMs, VEX, SARIF, QA reports, and more☆459Updated this week
- ☆15Updated 11 months ago
- Open source compliance tool for development platforms.☆286Updated last year
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 3 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆94Updated 3 months ago
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆201Updated last week
- Manage network policies, AWS, GCP & Azure IAM policies, Istio Authorization Policies, and Kafka ACLs in a Kubernetes cluster with ease.☆302Updated this week
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆54Updated 3 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 2 years ago
- BadRobot - Operator Security Audit Tool☆220Updated this week
- PoC collection☆11Updated 4 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆98Updated 5 months ago
- Israeli companies which create Open Source projects☆76Updated 2 months ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated 2 weeks ago
- This GitHub Action installs, configures & runs Redefine to optimize CI execution time and resources.☆22Updated 10 months ago
- A Trivy plugin that scans and outputs the results (vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repo…☆88Updated this week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago