An open-source collection of API key rotation tutorials.
☆77Feb 9, 2026Updated last month
Alternatives and similar repositories for how-to-rotate
Users that are interested in how-to-rotate are comparing it to the libraries listed below
Sorting:
- Automatically export CloudSQL databases to Google Cloud Storage☆10May 19, 2025Updated 9 months ago
- Things that would cause a git leaks scan to freak out☆20Updated this week
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- ☆12Oct 17, 2023Updated 2 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Provides a consistent API around some existing scanning tools to integrate them with the rest of the tool kit☆18Updated this week
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- A tool to notify you of the latest changes in bug bounty programs.☆16Jan 24, 2025Updated last year
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- A small utility that keeps your Git repositories from leaking secrets, skipping hooks, or quietly drifting out of compliance. It’s design…☆34Feb 23, 2026Updated 2 weeks ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 9 months ago
- Application whitelisting/blacklisting & end-user notifications for GSuite☆14Apr 19, 2018Updated 7 years ago
- Runtime Security Solution for your CI/CD Pipeline☆114Jan 30, 2026Updated last month
- Test Environment Booking tool☆14Nov 16, 2020Updated 5 years ago
- A GitHub App that acts like a Security Token Service (STS) for the Github API☆313Updated this week
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆32Nov 26, 2025Updated 3 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- ☆49Mar 21, 2023Updated 2 years ago
- Create honeypots for cloud environments☆112Oct 6, 2025Updated 5 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- 😎 A curated list of awesome resources for software engineer onboarding☆24Apr 2, 2021Updated 4 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- boostsecurityio/bagel☆79Feb 12, 2026Updated 3 weeks ago
- The Remix Supabase starter demonstrates how to integrate Supabase into an Remix project deployed on Netlify.☆14Updated this week
- Task management for small-group organizers.☆18Jul 23, 2022Updated 3 years ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆176Apr 23, 2025Updated 10 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Private key usage verification☆431Apr 4, 2025Updated 11 months ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29May 23, 2023Updated 2 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago