Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.
Обновлено 2024-11-08 00:52:18 +03:00
Microsoft Security DevOps for GitHub Actions toolkit.
Обновлено 2024-11-08 00:38:26 +03:00
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Обновлено 2024-11-07 15:50:53 +03:00
🔒 Specification for end-to-end encryption used by Nextcloud sync & mobile apps
Обновлено 2024-11-07 10:01:57 +03:00
DevSkim is a set of IDE plugins, language analyzers, and rules that provide security "linting" capabilities.
Обновлено 2024-11-07 02:29:34 +03:00
CodeQL: the libraries and queries that power security researchers around the world, as well as code scanning in GitHub Advanced Security
Обновлено 2024-11-07 02:05:26 +03:00
AVML - Acquire Volatile Memory for Linux
Обновлено 2024-11-07 01:57:21 +03:00
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Обновлено 2024-11-07 00:49:40 +03:00
Steeltoe samples and reference application collection
dotnet
hacktoberfest
security
cloud-foundry
asp
circuit-breaker
service-discovery
connector
management
microservice
steeltoe-components
discovery
music-store
steeltoe-connectors
Обновлено 2024-11-07 00:02:58 +03:00
nextcloud app that lets you Limit login to IP ranges
Обновлено 2024-11-06 23:34:28 +03:00
Canonical source for Mozilla Foundation Security Advisories. http://www.mozilla.org/security/announce/
Обновлено 2024-11-06 23:04:54 +03:00
Manages, configures, extracts and monitors Microsoft 365 tenant configurations
hacktoberfest
microsoft
powershell
devops
monitoring
office365
powerplatform
azuread
sharepoint
intune
exchangeonline
configuration-as-code
desiredstateconfiguration
microsoft365
onedrive
securityandcompliance
skypeforbusiness
teams
Обновлено 2024-11-06 22:31:13 +03:00
Detect and warn about suspicious IPs logging into Nextcloud
Обновлено 2024-11-06 21:30:41 +03:00
Entitlements plugin to manage GitHub Orgs and Team memberships and access
Обновлено 2024-11-06 00:50:22 +03:00
Entitlements plugin for a robust audit log
Обновлено 2024-11-06 00:46:17 +03:00
🔑 Second factor provider using an external messaging gateway (SMS, Telegram, Signal)
Обновлено 2024-11-05 04:50:42 +03:00
Actions for running CodeQL analysis
Обновлено 2024-11-05 00:57:39 +03:00
Manages application of security headers with many safe defaults
ruby
content-security-policy
cookie
csp
hsts
middleware
rack
referrer-policy
secure-headers
xframe-options
Обновлено 2024-11-04 18:07:20 +03:00
Revizor - a fuzzer to search for microarchitectural leaks in CPUs
Обновлено 2024-11-04 17:55:00 +03:00
Steeltoe .NET Core Components: CircuitBreaker, Configuration, Connectors, Discovery, Logging, Management, and Security
dotnet
dotnet-core
microservices
configuration
cloud-native
circuit-breaker
service-discovery
application-monitoring
load-balancer
Обновлено 2024-11-04 17:35:19 +03:00
Simple and flexible tool for managing secrets
Обновлено 2024-11-04 13:01:02 +03:00
Resources for improving Customer Experience with Azure Network Security
Обновлено 2024-11-04 11:12:11 +03:00
🔑 Second factor TOTP (RFC 6238) provider for Nextcloud
Обновлено 2024-11-04 04:55:22 +03:00
🔐 Server API to support End-to-End Encryption
Обновлено 2024-11-04 03:43:50 +03:00
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
detection
static-analysis
security-tools
application-inspector
security-scanner
software-characterization
Обновлено 2024-11-02 00:36:18 +03:00
A binary static analysis tool that provides security and correctness results for Windows Portable Executable and *nix ELF binary formats
Обновлено 2024-10-31 12:42:13 +03:00
Security utilities for key generation, string redaction, etc.
Обновлено 2024-10-30 22:45:43 +03:00
The Ruby Gem that Powers Entitlements - GitHub's Identity and Access Management System
Обновлено 2024-10-28 21:48:02 +03:00
🧹 Cleaning up images from Kubernetes nodes
hacktoberfest
kubernetes
containers
security-tools
vulnerabilities
vulnerability-scanner
image-security
images
kubernetes-operator
trivy
Обновлено 2024-10-24 23:26:25 +03:00
An example of how Entitlements can be configured
Обновлено 2024-10-24 16:19:17 +03:00