claroty / jwthenticator
A cloud first service for key to JWT authentication library and server written in Python 3
☆19Updated 2 weeks ago
Alternatives and similar repositories for jwthenticator:
Users that are interested in jwthenticator are comparing it to the libraries listed below
- A thin async wrapper for SQLAlchemy sessions☆10Updated 3 years ago
- A tool to create network tunnels over HTTP/S written in Python 3☆35Updated 2 months ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- WEED - What EEs Different - IAM role diff checker☆61Updated 2 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated last year
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆199Updated last week
- Automatically register and generate AWS, GCP & Azure IAM roles, X.509 certificates and username/password pairs for Kubernetes pods using …☆60Updated last month
- ☆21Updated 5 months ago
- BadRobot - Operator Security Audit Tool☆219Updated last week
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 4 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆38Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 6 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated last month
- Modron - Cloud security compliance☆33Updated 4 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆92Updated 2 months ago
- Easily sync open-policy rules to your feature toggles☆131Updated 9 months ago
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated 3 months ago
- By scanning CI/CD misconfigurations, Allero helps reduce production issues, harden your security posture and shift-left CI/CD from DevOps…☆205Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 3 months ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Security scanning & static analysis tool☆94Updated 6 months ago
- The Logger that will prevent your data leak☆97Updated 2 months ago
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- CLI utility to interact with the open source network mapper and Otterize Cloud.☆35Updated this week
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆746Updated 4 months ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Updated 3 years ago
- Tool for working with memory of a running Linux process☆12Updated 4 years ago