☆18Feb 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for security-assessments
Users that are interested in security-assessments are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OSCAL and Kyverno Policy Demo for AWS☆16Aug 16, 2023Updated 2 years ago
- Reference security architecture for AI applications☆14Mar 28, 2025Updated 11 months ago
- Vanilla datapack - Battle royal - Survival games - Hunger games☆11Jun 16, 2024Updated last year
- ☆11Nov 10, 2025Updated 4 months ago
- Witness Examples☆12Feb 27, 2024Updated 2 years ago
- ☆17Aug 26, 2025Updated 6 months ago
- Blogpost about building the SCION 25 Gbit/s Workstation☆40Jan 12, 2026Updated 2 months ago
- The procmail mail processing program☆10Apr 18, 2016Updated 9 years ago
- Efficient MCP tool calling in code mode for Claude Code☆23Dec 12, 2025Updated 3 months ago
- Lind: Secure Lightweight Adaptive Isolation☆32Jul 3, 2025Updated 8 months ago
- Friends of in-toto! A place to record integrations and adoptions of the in-toto specification.☆21Mar 16, 2026Updated last week
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Mar 15, 2026Updated last week
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆19Updated this week
- Go implementation of witness☆46Updated this week
- ORBIT: Open Resources for Baselines, Interoperability, and Tooling☆21Updated this week
- ☆16Updated this week
- OpenSSF Education SIG☆18Nov 15, 2025Updated 4 months ago
- Repository for accompanying materials to Threat Knowledge Graphs.☆18Jul 16, 2025Updated 8 months ago
- in-toto Enhancements