commoncriteria / application
Protection Profile for Application Software
☆10Updated this week
Alternatives and similar repositories for application
Users that are interested in application are comparing it to the libraries listed below
Sorting:
- A highly scalable collector for tricorder applications☆10Updated 7 years ago
- Linux kernel modules used to enumerate devices various buses☆11Updated 8 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Mozilla scribe host policy evaluator☆14Updated 2 years ago
- A secure and easy-to-use tool for managing sensitive data with built-in encryption, decryption, and key management. Protect your secrets …☆18Updated 5 months ago
- Vault Command Line (CLI) Client☆10Updated 4 years ago
- A curated list of Cloud Security techniques and tools☆29Updated last year
- CUE config adapter for Caddy☆13Updated 5 years ago
- Linux filesystem with a Google Docs backend, built using FUSE☆10Updated 5 years ago
- An HTTP service for mapping IPv4 and IPv6 addresses to cities, countries & continents☆16Updated 6 years ago
- TimerMetrics captures timings and enables periodic metrics every n events☆15Updated 5 years ago
- Easy `inlets` client execution.☆12Updated 4 years ago
- Expect for Go☆11Updated last year
- NAT server (cluster) with peers bootstrapped using tailscale☆10Updated 4 years ago
- A remote union filesystem.☆10Updated 5 years ago
- Secure temporary directories and files in Go (ram disk, tmpfs)☆12Updated 4 years ago
- NAT probing toolkit.☆22Updated 5 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 4 years ago
- Repository to allow collaboration between Cycle Labs Cloud community in support of the community.☆9Updated 3 years ago
- Daemon that runs on hosts and provides limited remote control access.☆20Updated 4 years ago
- A sleep-aware-sleep() function☆12Updated 3 months ago
- Kernel assisted microcontainer packer☆24Updated 6 years ago
- ☆9Updated last year
- Build simple social graphs for GitHub☆15Updated 10 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆22Updated 3 years ago
- Maintain a changelog easily☆9Updated 4 years ago
- Materialized local view of your ECS cluster state built on top of the Amazon ECS event stream.☆16Updated 2 years ago
- efficient linux security monitoring☆26Updated 6 years ago
- SSH Two-factor Authentication Module in Python☆15Updated 11 years ago
- Pollux payload core files and examples☆3Updated 2 weeks ago