trufflesecurity / how-to-rotate
An open-source collection of API key rotation tutorials.
☆67Updated this week
Alternatives and similar repositories for how-to-rotate:
Users that are interested in how-to-rotate are comparing it to the libraries listed below
- A tool for preventing the installation of malicious PyPI and npm packages☆129Updated this week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆83Updated 2 weeks ago
- ☆164Updated 6 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- boostsecurityio/poutine☆259Updated 3 weeks ago
- ☆61Updated last month
- ☆112Updated 2 months ago
- A tool to check the security settings of Github Organizations.☆71Updated last year
- Security tool against dependency typosquatting attacks☆39Updated this week
- Protect against subdomain takeover☆93Updated 10 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated last month
- A Software as a Service (SaaS) log collection framework.☆162Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- boostsecurityio/lotp☆116Updated last week
- AWS honey token manager☆87Updated 7 months ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆111Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- A project to visualize the software supply chain☆40Updated last year
- ☆98Updated 2 weeks ago
- A tool to uncover undocumented APIs from the AWS Console.☆99Updated 4 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆138Updated 2 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 2 weeks ago
- Enrich SBOMs with data from third party services☆161Updated last month
- The security workflow engine!☆105Updated this week
- ☆175Updated 4 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 6 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated last week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 5 months ago