iteratec / kcwardenLinks
Keycloak Configuration Auditor
☆62Updated this week
Alternatives and similar repositories for kcwarden
Users that are interested in kcwarden are comparing it to the libraries listed below
Sorting:
- scripts which help harden containers☆32Updated 2 years ago
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆139Updated 2 years ago
- Helm Charts for Dependency-Track☆42Updated this week
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆87Updated this week
- ☆177Updated 3 years ago
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆77Updated this week
- Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive d…☆152Updated this week
- Validate the isolation posture of your container environment.☆300Updated 2 months ago
- Vulnerable Java Web Application (for demo and education purposes)☆63Updated 3 months ago
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆181Updated last week
- Tool to find common vulnerabilities in cryptographic public keys☆294Updated last month
- A standard API specification for exchanging supply chain artifacts and intelligence☆86Updated last week
- Keycloak's Site Reliability Engineers Special Interest Group (Keycloak SRE SIG): To improve the lives of people running and operating Key…☆30Updated this week
- a bash openid connect client☆119Updated 5 months ago
- verinice is a tool for managing information security.☆206Updated 8 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated last month
- Keycloak security scanner☆55Updated last year
- A utility to (re-)import findings and language data into DefectDojo☆43Updated last year
- Machine-readable specification for the attestation of security-relevant data.☆63Updated 3 weeks ago
- Outil de sécurité des architectures kubernetes avancées☆56Updated 3 months ago
- Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.☆67Updated last year
- Inspect certificate authorities in container images☆237Updated last week
- Produce an Open Source Vulnerability JSON file based on information in an SPDX document☆64Updated last year
- ☆22Updated 6 years ago
- This repository contains the container image scanning tool ORCA☆41Updated last month
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆111Updated last month
- Format agnostic SBOM tooling☆116Updated this week
- ☆111Updated last year
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆143Updated this week
- ☆119Updated 5 months ago