☆11May 16, 2024Updated last year
Alternatives and similar repositories for OAuthpaper-code
Users that are interested in OAuthpaper-code are comparing it to the libraries listed below
Sorting:
- ☆11Dec 26, 2023Updated 2 years ago
- Keycloak gRPC extension☆12Mar 2, 2023Updated 3 years ago
- Streaming Generative AI Application on AWS☆14Jun 24, 2024Updated last year
- This Chromium extensions aims at supporting the analysis of single sign-on implementations, by offering semi-automated analysis and attac…☆29Jul 4, 2023Updated 2 years ago
- An API gateway plugin to introspect opaque access tokens and forward JWT access tokens to APIs☆18Feb 17, 2025Updated last year
- Easy way how to add Quarkus extensions to your Keycloak deployment☆20Feb 4, 2026Updated last month
- A proposal to extend FedCM to allow RPs to accept "any" registered IdP☆18Mar 10, 2026Updated last week
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆14Sep 4, 2025Updated 6 months ago
- Real-time web shop streaming analytics on AWS☆14Sep 18, 2024Updated last year
- ☆17Jan 28, 2026Updated last month
- Spring Boot (reactive) Integration with Open Policy Agent (OPA)☆34Nov 1, 2023Updated 2 years ago
- Opens the file from the attached process to be able to debug (might be usefull)☆13Jul 8, 2019Updated 6 years ago
- Exposing Keycloak metrics endpoints for Prometheus!☆15Feb 16, 2026Updated last month
- A simple cloth simulation program written in C++ and OpenGL. Based on spring-damper model with diverse controls.☆18Mar 31, 2021Updated 4 years ago
- A tool that can be used to close network connections automatically with a given parameters☆14Apr 19, 2023Updated 2 years ago
- Keycloak provider implementation to support SIOP-2 clients and the issuance of VerifiableCredentials through the Account-Console.☆22Apr 24, 2024Updated last year
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- A Work Item of the Federated Identity Community Group.☆14Nov 20, 2025Updated 4 months ago
- ☆22Jan 28, 2026Updated last month
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- ☆11Mar 5, 2023Updated 3 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- A CodeQL automation tool to execute code scanning.☆12Oct 16, 2023Updated 2 years ago
- A repository that contains examples for Spring HATEOAS Siren to showcase how to use the features provided by the library.☆12Mar 20, 2023Updated 3 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- ☆10Nov 9, 2023Updated 2 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- Java interpreter for OPA's Rego language☆12Feb 8, 2022Updated 4 years ago
- Public Cybersecurity Research & Advisories☆22Jan 12, 2026Updated 2 months ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- ☆13Jul 5, 2018Updated 7 years ago
- IoT Scanner by ASA - Scan for active IoT devices and find their vulnerabilities☆11Apr 28, 2022Updated 3 years ago
- Tired of searching the web for stupid device identifiers? Join the club 🙄☆13Mar 9, 2026Updated last week
- ☆13Oct 24, 2024Updated last year
- 在线页面设计工具☆12Oct 30, 2018Updated 7 years ago
- ESP-IDF example for the LILYGO T-Dongle-S3☆11Jan 27, 2023Updated 3 years ago
- ☆23Oct 17, 2024Updated last year
- 基于SpringBoot的在线算法判题系统(Online judgement) JavaScript判题☆12Oct 22, 2019Updated 6 years ago
- Keycloak's Site Reliability Engineers Special Interest Group (Keycloak SRE SIG): To improve the lives of people running and operating Key…☆31Feb 3, 2026Updated last month