trufflesecurity / how-to-rotateLinks
An open-source collection of API key rotation tutorials.
☆74Updated last month
Alternatives and similar repositories for how-to-rotate
Users that are interested in how-to-rotate are comparing it to the libraries listed below
Sorting:
- boostsecurityio/poutine☆339Updated 2 weeks ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆168Updated this week
- ☆123Updated this week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆112Updated 2 weeks ago
- The security workflow engine!☆126Updated last week
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Scans your Github Actions for security issues☆86Updated this week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆42Updated 2 years ago
- ☆114Updated 2 months ago
- ☆91Updated 9 months ago
- ☆191Updated 6 months ago
- Security tool against dependency typosquatting attacks☆54Updated last week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated 4 months ago
- OWASP Foundation Web Respository☆99Updated 2 weeks ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆153Updated 11 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆61Updated 2 weeks ago
- Gram is Klarna's own threat model diagramming tool☆326Updated 3 weeks ago
- Protect against subdomain takeover☆94Updated 3 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆43Updated 2 weeks ago
- boostsecurityio/lotp☆136Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆310Updated 2 weeks ago
- AWS honey token manager☆89Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆127Updated 8 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆120Updated last month
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆58Updated 9 months ago
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆130Updated 9 months ago
- Runtime Security Solution for your CI/CD Pipeline☆110Updated 4 months ago
- cloudgrep is grep for cloud storage☆325Updated 8 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago