Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev
☆10May 19, 2025Updated 9 months ago
Alternatives and similar repositories for trustier
Users that are interested in trustier are comparing it to the libraries listed below
Sorting:
- A standard API specification for exchanging supply chain artifacts and intelligence☆100Feb 20, 2026Updated last week
- OpenID Connect Provider Plugin for Jenkins☆23Feb 23, 2026Updated last week
- ☆31Oct 28, 2024Updated last year
- ☆36Apr 29, 2025Updated 10 months ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- Libary for using OScam dvbapi within various applications. This Plugin is not for usage, only experiment and research.☆11Jan 4, 2024Updated 2 years ago
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- A Docker-based development stack for Bedrock WordPress multisite, optimized for local development, source control, and CI/CD integration.☆14Jun 26, 2025Updated 8 months ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- Convert Confluence MIME exports (.doc) to clean Markdown☆34Jan 13, 2026Updated last month
- Docling simplifies document processing, parsing diverse formats — including advanced PDF understanding — and providing seamless integrati…☆17Updated this week
- A dark retro theme for Zola☆35Dec 29, 2025Updated 2 months ago
- Visual automation with Backstop JS☆10Jan 22, 2026Updated last month
- Go (golang) package for providing a means to handle git-log.☆11Apr 6, 2024Updated last year
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆18Jul 25, 2025Updated 7 months ago
- Static analysis for llvm☆20Mar 31, 2015Updated 10 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆48Jun 13, 2023Updated 2 years ago
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- ☆11Jan 22, 2020Updated 6 years ago
- ☆15Jan 28, 2026Updated last month
- Multilayered secret detection tool☆41Feb 11, 2026Updated 2 weeks ago
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- Automatically distribute GitHub Actions workflow across repositories.☆12Feb 22, 2026Updated last week
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Updated this week
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆13Sep 4, 2025Updated 5 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- A repository of remark/rehype, Zod, Astro plugins and more☆16Feb 21, 2026Updated last week
- This guidance focuses on the part of payments processing systems that post payments to recieving accounts. In this phase, inbound transac…☆21Sep 22, 2025Updated 5 months ago
- Portfolio website of Yinka Adedire, Frontend Developer. Built with GatsbyJS.☆11Nov 4, 2022Updated 3 years ago
- Interfaces and implementations for building Kubernetes releases.☆19Updated this week
- Dark colorscheme with vivid colors for Vim☆12Oct 8, 2024Updated last year
- Tilera-based phishing mitigation layer☆10Feb 11, 2016Updated 10 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- ☆17Apr 27, 2025Updated 10 months ago
- Start of an Internet draft on the separation between HTTP's semantic layer, framing layer(s), and the underlying transport layer.☆15Mar 22, 2016Updated 9 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- AGV☆14Aug 29, 2015Updated 10 years ago
- Witness Examples☆12Feb 27, 2024Updated 2 years ago