relizaio / rearmLinks
ReARM - Supply Chain Security and Asset Management for Releases, SBOMs, xBOMs, Security Artifacts
☆56Updated this week
Alternatives and similar repositories for rearm
Users that are interested in rearm are comparing it to the libraries listed below
Sorting:
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆120Updated 2 months ago
- ☆71Updated 3 weeks ago
- A Software as a Service (SaaS) log collection framework.☆177Updated this week
- SBOM Move - Automate build and transfer of SBOMs across systems☆23Updated last week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆128Updated last week
- ☆74Updated 5 months ago
- AWS honey token manager☆87Updated last year
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆109Updated this week
- Tool for obfuscating and deobfuscating data.☆73Updated last year
- Security tool against dependency typosquatting attacks☆53Updated this week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆58Updated last year
- Generate datasets of cloud audit logs for common attacks☆218Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 10 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆152Updated 9 months ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆80Updated this week
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated last week
- A tool for preventing the installation of malicious npm and PyPI packages☆158Updated last week
- An OpenAI API Compatible Honeypot Gateway☆16Updated 5 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆38Updated 2 weeks ago
- ☆27Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆124Updated 4 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆168Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆114Updated 3 weeks ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 11 months ago
- ☆30Updated 2 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated 3 weeks ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆93Updated last week
- ☆93Updated 3 weeks ago