endorama / 2amiLinks
Your easy 2FA companion that keep the secrets secret.
☆28Updated 2 months ago
Alternatives and similar repositories for 2ami
Users that are interested in 2ami are comparing it to the libraries listed below
Sorting:
- build distroless images with alpine tools☆130Updated 3 years ago
- 🔐 Sync public ssh keys to ~/.ssh/authorized_keys, based on Github/Gitlab organization membership.☆142Updated 10 months ago
- Open Source runtime scanner for Linux containers (LXD / LXC), It performs security audit checks based on CIS Linux containers Benchmark …☆26Updated last year
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Hardened alpine linux baseimage for Docker.☆153Updated 10 months ago
- Secure base image for running nginx.☆26Updated last year
- ssh jump host appliance☆26Updated 3 years ago
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Updated 6 years ago
- Web application security checklist☆40Updated 9 years ago
- show which process did what DNS queries☆36Updated 8 years ago
- Terraform provider for the Gandi Domain services☆154Updated last year
- A small collection of AWS utilities, packaged as a single standalone binary.☆13Updated 2 years ago
- Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.☆281Updated last year
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- Simple ssh-agent that loads keys stored from Moolticute☆15Updated 2 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆121Updated 3 years ago
- Some bash scripts that are useful when performing research on Google's Cloudshell☆44Updated last year
- Writing a container in a few lines of Go code, as seen at DockerCon 2017 and on O'Reilly Safari☆40Updated 5 years ago
- A CLI-based HTTP intercept and replay proxy☆266Updated 4 months ago
- A local scanner for vulnerable web applications☆41Updated this week
- Test ssh login key acceptance without having the private key☆216Updated 4 years ago
- CERT NZ documentation for hardening SSH server and client configuration, and using hardware tokens to protect private keys☆19Updated 7 years ago
- Open source compliance tool for development platforms.☆286Updated 2 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- ☆62Updated 13 years ago
- A Web of Trust Short-Lived Client Certificate System (Server)☆20Updated 2 years ago
- Security scanning & static analysis tool☆93Updated last year
- Keyless Git signing using Sigstore☆1,054Updated last week
- GO sandbox to run untrusted code☆42Updated 6 years ago
- A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x "JNDI LDAP" vulnerability.☆71Updated 4 years ago