owenrumney / squealer
Telling tales on you for leaking secrets!
☆232Updated last week
Alternatives and similar repositories for squealer:
Users that are interested in squealer are comparing it to the libraries listed below
- Open source compliance tool for development platforms.☆286Updated last year
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆111Updated 5 months ago
- Vulnerability scanning just got lazier☆286Updated 2 weeks ago
- Identity & Access Management simplified and secure.☆254Updated 2 years ago
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆319Updated 2 weeks ago
- Scan publicly accessible assets on your AWS cloud environment☆139Updated 9 months ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- List of known AWS accounts☆190Updated last week
- Secret management by contract toolchain☆149Updated last week
- Evaluate source control (GitHub) security posture☆249Updated 2 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆269Updated 6 months ago
- Friends don't let friends leak secrets on their terminal window☆104Updated 3 years ago
- A GitHub App that acts like a Security Token Service (STS) for the Github API☆179Updated last week
- OWASP Domain Protect - prevent subdomain takeover☆400Updated 3 months ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆268Updated 4 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- A tool for preventing the installation of malicious PyPI and npm packages☆132Updated this week
- AWS honey token manager☆87Updated 8 months ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆153Updated 7 months ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 2 weeks ago
- Inspect certificate authorities in container images☆231Updated last week
- Automate permissions to your cloud and critical applications.☆239Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆262Updated 2 years ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated 11 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆84Updated 3 weeks ago
- ☆53Updated last week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 7 months ago
- ☆48Updated 2 years ago
- Open-source best practices for protecting a secure, sensible cloud platform☆124Updated 5 months ago
- Protect against subdomain takeover☆93Updated 10 months ago