witchery-project / witcheryLinks
build distroless images with alpine tools
☆131Updated 3 years ago
Alternatives and similar repositories for witchery
Users that are interested in witchery are comparing it to the libraries listed below
Sorting:
- Tools to construct a read-only container 'registry' served by plain Nginx☆74Updated 4 years ago
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Updated 3 years ago
- Dirty hack to run a read-only, public Docker registry on almost any static file hosting service (e.g. NGINX, Netlify, S3...)☆179Updated 9 months ago
- A non-interactive daemon for host management☆117Updated this week
- Test ssh login key acceptance without having the private key☆216Updated 4 years ago
- oci and apk explorer☆99Updated this week
- SSH Certificate Authority with device attestation☆55Updated last year
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆42Updated 2 years ago
- Container image registry that serves images built fresh when you ask for them☆232Updated 9 months ago
- Inspect certificate authorities in container images☆240Updated last week
- ☆99Updated 2 months ago
- rsync wrapper (or output parser) that pushes metrics to prometheus☆63Updated 7 months ago
- CLI tool for CIDR range operations (check, generate)☆138Updated 5 years ago
- docker image with useful network and container tools and SSH☆68Updated last year
- Writing a container in a few lines of Go code, as seen at DockerCon 2017 and on O'Reilly Safari☆40Updated 5 years ago
- Age based repository file encryption gitops tool☆330Updated this week
- [Soft-deprecated] Reproducible apt/dnf/apk/pacman, with content-addressing☆110Updated 2 years ago
- Extended ssh-agent which supports git commit signing and yubikey signing over ssh☆20Updated last year
- Recipes for baking systemd-sysext images☆123Updated last week
- Proxy for enforcing webauthn authentication☆142Updated 2 weeks ago
- A lightweight service exchanging OIDC tokens for Tailscale Auth Keys☆32Updated 2 years ago
- PKI support for SSH certificates☆64Updated 4 years ago
- Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.☆78Updated 2 years ago
- Age plugin to split keys and wrap them with different recipients using Shamir's Secret Sharing.☆45Updated last week
- Mirror only. Official repository at https://git.glasklar.is/system-transparency/core/system-transparency☆89Updated 5 months ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆179Updated 2 weeks ago
- Silly usage of AWS EC2 IPv6 prefixes☆317Updated 3 years ago
- demo of keyless signing with the sigstore kubernetes policy controller☆11Updated 3 years ago
- 🦐SSH Certificate Authority in a Lambda (on the barbie)☆119Updated 5 years ago
- HIBA is a system built on top of regular OpenSSH certificate-based authentication that allows to manage flexible authorization of princip…☆386Updated 6 months ago