iteratec / kcwardenLinks
Keycloak Configuration Auditor
☆53Updated this week
Alternatives and similar repositories for kcwarden
Users that are interested in kcwarden are comparing it to the libraries listed below
Sorting:
- scripts which help harden containers☆31Updated 2 years ago
- verinice is a tool for managing information security.☆204Updated 7 months ago
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆157Updated this week
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆137Updated 2 years ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆82Updated this week
- ☆176Updated 3 years ago
- Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive d…☆144Updated this week
- Helm Charts for Dependency-Track☆42Updated this week
- Tool to find common vulnerabilities in cryptographic public keys☆291Updated last week
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆76Updated last week
- a bash openid connect client☆119Updated 4 months ago
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆142Updated this week
- Peekaboo Extended Email Attachment Behavior Observation Owl☆69Updated 2 weeks ago
- Validate the isolation posture of your container environment.☆297Updated 2 weeks ago
- Keycloak's Site Reliability Engineers Special Interest Group (Keycloak SRE SIG): To improve the lives of people running and operating Key…☆30Updated last week
- a third party module that extends keycloak by SCIM functionality☆196Updated last year
- A standard API specification for exchanging supply chain artifacts and intelligence☆83Updated 2 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated last week
- A Keycloak authenticator to restrict authorization on clients☆377Updated last week
- Outil de sécurité des architectures kubernetes avancées☆55Updated 2 months ago
- Produce an Open Source Vulnerability JSON file based on information in an SPDX document☆64Updated last year
- ☆118Updated 4 months ago
- Ansible role to install a rootless Docker server☆73Updated this week
- ☆78Updated 3 months ago
- ☆22Updated 6 years ago
- A BOM repository server for distributing CycloneDX BOMs☆77Updated 2 months ago
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆127Updated 7 months ago
- OpenID Connect, the authentication protocol and identity layer on top of OAuth 2.0 used in many SSO and adopted in many social logins (Ap…☆62Updated last week
- A searchable directory of TLS ciphersuites and related security details.☆106Updated this week
- Audit Dependency-Track findings and policy violations via policy as code☆33Updated 2 weeks ago