A tool for secrets management, encryption as a service, and privileged access management
-
Updated
Dec 4, 2020 - Go
{{ message }}
A tool for secrets management, encryption as a service, and privileged access management
A system for distributing and managing secrets
It would be nice to include k8s liveness and readiness probes support.
A helm plugin that help manage secrets with Git workflow and store them anywhere
transparently encrypt files within a git repository
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Program to reverse Docker images into Dockerfiles
Starting at the "Create a staging environment", the steps described in the guide quickly outpace the explanations and it was not obvious to me what was going on. The quickstart assumes knowledge of concepts (environments, machines) that I would have liked to see brief explanations of.
The Quickstart could also use now.sh as an example deployment environment so that the user can follow along wit
Reconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Scan your code for security misconfiguration, search for passwords and secrets.
CyberArk Conjur automatically secures secrets used by privileged users and machine identities
Client for HashiCorp's Vault
Simple HS256 JWT token brute force cracker
Cryptr: a GUI for Hashicorp's Vault
Simplified secrets management solution
Simple to use, simple to deploy, one time self destruct messaging service, with hashicorp vault as a backend
secretz, minimizing the large attack surface of Travis CI
I am not sure if this belongs here, but I am having an issue when using this Github Action.
This is the link to the github run that failed:
https://github.com/jampp/migratron/pull/25/checks?check_run_id=456554120
and the content is:
Uploading distributions to https://test.pypi.org/legacy/
Uploading migratron-1.1.0-py3-none-any.whl
0%| | 0.00/30.5k [00:00<?, ?B/s]
100%|
Create Kubernetes secrets from Vault for a secure GitOps based workflow.
a vault client, but for servers and containers.
Azure Key Vault to Kubernetes (akv2k8s for short) makes it simple and secure to use Azure Key Vault secrets, keys and certificates in Kubernetes.
Manage secrets with Vault inside a Kubernetes cluster
A Vault secrets plugin for generating high entropy passwords and passphrases.
Jenkins plugin to populate environment variables from secrets stored in HashiCorp's Vault.
Identify hardcoded secrets and dangerous behaviours
Yar is a tool for plunderin' organizations, users and/or repositories.
Add a description, image, and links to the secrets topic page so that developers can more easily learn about it.
To associate your repository with the secrets topic, visit your repo's landing page and select "manage topics."
A great resource of various types of sensitive keys can be found here: https://gist.github.com/EdOverflow/8bd2faad513626c413b8fc6e9d955669