iteratec / kcwardenLinks
Keycloak Configuration Auditor
☆55Updated this week
Alternatives and similar repositories for kcwarden
Users that are interested in kcwarden are comparing it to the libraries listed below
Sorting:
- scripts which help harden containers☆32Updated 2 years ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆86Updated this week
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆138Updated 2 years ago
- Keycloak's Site Reliability Engineers Special Interest Group (Keycloak SRE SIG): To improve the lives of people running and operating Key…☆30Updated 2 weeks ago
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆179Updated this week
- a bash openid connect client☆119Updated 4 months ago
- Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive d…☆150Updated this week
- ☆177Updated 3 years ago
- verinice is a tool for managing information security.☆207Updated 7 months ago
- A Keycloak authenticator to restrict authorization on clients☆379Updated 3 weeks ago
- Helm Charts for Dependency-Track☆42Updated 2 weeks ago
- A utility to (re-)import findings and language data into DefectDojo☆43Updated 11 months ago
- a third party module that extends keycloak by SCIM functionality☆197Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated 2 weeks ago
- ☆22Updated 6 years ago
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆76Updated this week
- Vulnerable Java Web Application (for demo and education purposes)☆63Updated 3 months ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆84Updated last week
- Validate the isolation posture of your container environment.☆298Updated last month
- Keycloak: Home IdP Discovery - discover home identity provider or realm by email domain☆306Updated 3 weeks ago
- Tool to find common vulnerabilities in cryptographic public keys☆292Updated 2 weeks ago
- Ansible role to install a rootless Docker server☆73Updated last week
- Inspect certificate authorities in container images☆236Updated last week
- A searchable directory of TLS ciphersuites and related security details.☆106Updated this week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated 3 weeks ago
- A wrapper for integrating the OWASP Coraza WAF with HAProxy's SPOE filters.☆130Updated last week
- The security workflow engine!☆119Updated last week
- ☆120Updated 5 months ago
- Produce an Open Source Vulnerability JSON file based on information in an SPDX document☆64Updated last year
- Login to jitsi with keycloak https://github.com/d3473r/jitsi-keycloak/pkgs/container/jitsi-keycloak☆57Updated 4 months ago