twilio-labs / gordonView external linksLinks
Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive code ownership at scale within an organization
☆20Feb 4, 2025Updated last year
Alternatives and similar repositories for gordon
Users that are interested in gordon are comparing it to the libraries listed below
Sorting:
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆14Apr 28, 2021Updated 4 years ago
- Manage GuardDuty At Enterprise Scale☆22Sep 17, 2020Updated 5 years ago
- ☆25Jun 27, 2024Updated last year
- Everything Application Security☆27Updated this week
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆26Nov 23, 2017Updated 8 years ago
- ☆34Aug 6, 2025Updated 6 months ago
- ☆43Aug 27, 2025Updated 5 months ago
- ☆25Mar 28, 2018Updated 7 years ago
- This service provides authenticated access to a static website hosted in an s3 bucket.☆33Feb 25, 2023Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆48Dec 29, 2023Updated 2 years ago
- Protect against subdomain takeover☆95Jul 20, 2025Updated 6 months ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- – Release management for cordova and ionic based applications.☆11Nov 20, 2016Updated 9 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Host and manage Bingo games on the Web☆12Jan 1, 2020Updated 6 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆60Feb 5, 2025Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Jan 30, 2025Updated last year
- General sigstore community repo☆44Feb 5, 2026Updated last week
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- K8 Deep dive - Core Concepts, CRDs, Operators, Controllers, Openshift, kubebuilder, Coreos operator framework☆10May 1, 2023Updated 2 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- GitHub action to download and install Xanitizer, and to run a Xanitizer security analysis in a GitHub workflow.☆10Jan 11, 2021Updated 5 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆13Nov 1, 2023Updated 2 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated last week
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆35Oct 23, 2025Updated 3 months ago
- token exchange as a service☆11Feb 5, 2026Updated last week
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago