endorama / 2amiLinks
Your easy 2FA companion that keep the secrets secret.
☆28Updated 2 months ago
Alternatives and similar repositories for 2ami
Users that are interested in 2ami are comparing it to the libraries listed below
Sorting:
- build distroless images with alpine tools☆130Updated 3 years ago
- The Swiss Army knife for backend engineers.☆95Updated 4 years ago
- 🔐 Sync public ssh keys to ~/.ssh/authorized_keys, based on Github/Gitlab organization membership.☆142Updated 10 months ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 5 years ago
- Build lib around secretin https://github.com/agix/secretin and migrate to the future !☆17Updated 2 years ago
- A local scanner for vulnerable web applications☆41Updated last week
- Test ssh login key acceptance without having the private key☆216Updated 4 years ago
- Connect to any device with no external listening ports open☆282Updated this week
- DIY FIDO2 U2F token☆43Updated 2 years ago
- A simple, static DNS server.☆85Updated 2 years ago
- ☆28Updated 4 years ago
- GO sandbox to run untrusted code☆42Updated 6 years ago
- Filtering reverse HTTP proxy☆176Updated 2 years ago
- Terraform provider for the Gandi Domain services☆154Updated last year
- Automatically mirrored from https://git.circuitco.de/self/gitea-github-mirror☆15Updated 7 years ago
- A small collection of AWS utilities, packaged as a single standalone binary.☆13Updated 2 years ago
- Enhanced (but compatible) version of the classic ttyrec☆125Updated 2 years ago
- Secure base image for running nginx.☆26Updated last year
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆75Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆46Updated 3 years ago
- Open Source runtime scanner for Linux containers (LXD / LXC), It performs security audit checks based on CIS Linux containers Benchmark …☆26Updated last year
- Self destructing encrypted notes☆131Updated 3 years ago
- Random IPv6 - circumvents restrictive IP address-based filter and blocking rules☆23Updated 9 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆86Updated 4 years ago
- Fast syncronization across networks using speedy compression, lots of parallelization and fast hashmaps for keeping track of things inter…☆96Updated 5 months ago
- Command line utility for parsing certificates☆67Updated 4 years ago
- zero-trust remote firewall instrumentation☆255Updated 3 weeks ago
- A software FIDO2/U2F authenticator☆52Updated 2 years ago
- Web application security checklist☆40Updated 9 years ago