cybrota / scharfLinks
Static analysis tool to Identify and Fix GitHub Actions prone to Supply‑Chain Risks
☆12Updated 2 weeks ago
Alternatives and similar repositories for scharf
Users that are interested in scharf are comparing it to the libraries listed below
Sorting:
- ☆70Updated last month
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆57Updated last year
- The security workflow engine!☆118Updated this week
- Automated testing, generation & manipulation of #osquery packs☆73Updated 9 months ago
- ☆73Updated 4 months ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆11Updated 3 weeks ago
- A Software as a Service (SaaS) log collection framework.☆174Updated last week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- ☆81Updated last week
- ☆55Updated 2 weeks ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆45Updated this week
- ☆30Updated last month
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- ☆91Updated last month
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Kafka connector to sync Zed lakes to and from Kafka topics☆18Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated last week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆88Updated last week
- Gain insight into any Linux command or application with no code modification☆39Updated 7 months ago
- DNS at ludicrous speed for Go, powered by XDP sockets. [EXPERIMENTAL]☆11Updated 3 weeks ago
- NIST OSCAL SDK and CLI☆19Updated 3 weeks ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Identity governance for any SaaS, infrastructure, or tool☆86Updated 2 months ago
- Scalable integrity framework for ABAC on AWS☆55Updated 4 months ago
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆17Updated 5 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆106Updated 6 months ago
- Kubernetes audit logging, when you don't control the control plane☆82Updated this week