trufflesecurity / how-to-rotateLinks
An open-source collection of API key rotation tutorials.
☆70Updated 3 months ago
Alternatives and similar repositories for how-to-rotate
Users that are interested in how-to-rotate are comparing it to the libraries listed below
Sorting:
- A tool for preventing the installation of malicious PyPI and npm packages☆148Updated this week
- Security tool against dependency typosquatting attacks☆52Updated this week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated this week
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆122Updated 5 months ago
- ☆71Updated 4 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- ☆110Updated this week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 9 months ago
- ☆113Updated last week
- ☆69Updated 2 weeks ago
- ☆184Updated 2 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆57Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 4 months ago
- boostsecurityio/lotp☆126Updated 2 months ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆120Updated 4 months ago
- boostsecurityio/poutine☆301Updated 2 weeks ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- Protect against subdomain takeover☆92Updated last year
- https://breaches.cloud☆40Updated 8 months ago
- A Software as a Service (SaaS) log collection framework.☆173Updated this week
- OpenVEX Specification☆151Updated 3 weeks ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 8 months ago
- AWS honey token manager☆87Updated 10 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆99Updated this week
- A project to visualize the software supply chain☆51Updated last year
- ☆73Updated 3 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆143Updated last year
- ☆90Updated this week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆149Updated 7 months ago