Orca Security - IaC Security GitHub Action
☆14Feb 6, 2025Updated last year
Alternatives and similar repositories for shiftleft-iac-action
Users that are interested in shiftleft-iac-action are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆39Sep 12, 2025Updated 6 months ago
- Official repository for all Spot by NetApp Kubernetes Helm Charts.☆18Aug 14, 2024Updated last year
- My NiriWM dotfiles☆32Jul 30, 2025Updated 7 months ago
- Reference of OMR data☆22Nov 19, 2025Updated 4 months ago
- Release engineering, simplified☆69Mar 10, 2026Updated last week
- A simple, configurable, multi-platform spinner☆70Feb 25, 2023Updated 3 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- Alfred Workflow that adds a hotkey to toggle MacOS mic input level☆11Apr 3, 2017Updated 8 years ago
- Entra ID Password Protection Banned Password Lists☆18Apr 16, 2024Updated last year
- Alexa Skill Lambda Function for accessing Particle devices☆18Mar 27, 2018Updated 7 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- A chrome extension to highlight trans erasure☆13Feb 14, 2025Updated last year
- Modifies Raspberry Pi OS 64-bit images to work on the Clockwork DevTerm CM4.☆12Jun 16, 2023Updated 2 years ago
- Helm chart to deploy an (unofficial) Bitwarden provider for the Kubernetes External Secrets Operator.☆15Nov 20, 2025Updated 4 months ago
- better-folds.nvim☆14May 24, 2023Updated 2 years ago
- This user script allows you to filter the list of ratings by a keyword.☆20Jul 17, 2021Updated 4 years ago
- For Python ID X Traveloka Jakarta Spesial Kartini☆10Apr 20, 2018Updated 7 years ago
- Advanced Cluster Security for Kubernetes tutorial☆14Apr 22, 2024Updated last year
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Meta-Filesystem for remote software development☆23Mar 13, 2020Updated 6 years ago
- Source code for my USB-controlled Furby☆19Oct 20, 2021Updated 4 years ago
- A SBOM-centric security scanner.☆20Updated this week
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- A proxy server for PostgreSQL replication connections with the capability to filter out user defined subsets of data☆14Mar 21, 2025Updated last year
- The Beatconnect desktop app ! Download and manage beatmaps, collection and packs directly in sync with Osu!☆41Mar 22, 2024Updated 2 years ago
- Simple ssh-agent that loads keys stored from Moolticute☆15Mar 27, 2023Updated 2 years ago
- Position tracking software based on wi-fi signals☆21Nov 19, 2020Updated 5 years ago
- A command-line utility to use OS X's geolocation service☆38Nov 21, 2013Updated 12 years ago
- A clock for book lovers that tells the time using quotes from literature. Support for multiple languages, themes, and more!☆14Mar 2, 2026Updated 2 weeks ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Vanilla NFT Standard For Representing Abstract Ownership☆11Jul 13, 2022Updated 3 years ago
- ☆10Aug 9, 2023Updated 2 years ago
- Demos for our research on Github actions script injection vulnerabilities☆13May 14, 2024Updated last year
- ☆11May 27, 2025Updated 9 months ago
- A walkthrough of how a Kubernetes Pod can be exploited by a hacker☆11Aug 29, 2023Updated 2 years ago
- shepherd is a framework to build content moderation systems.☆13Updated this week
- ☆21Jan 31, 2021Updated 5 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- [Tab] When bash-completion meets fuzzy finder.☆31Mar 15, 2026Updated last week