Showing 334 open source projects for "group security policy"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
    AI-based, Comprehensive Service Management for Businesses and IT Providers

    Modular solutions for change management, asset management and more

    ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
  • 1
    Open Policy Agent

    Open Policy Agent

    An open source, general-purpose policy engine

    Policy-based control for cloud-native environments. Flexible, fine-grained control for administrators across the stack. Stop using a different policy language, policy model, and policy API for every product and service you use. Use OPA for a unified toolset and framework for policy across the cloud-native stack. Whether for one service or for all your services, use OPA to decouple policy from the service's code so you can release, analyze, and review policies (which security and compliance...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    SCAP Security Guide

    SCAP Security Guide

    Security automation content in SCAP, Bash, Ansible, and other formats

    The purpose of this project is to create security policy content for various platforms, Red Hat Enterprise Linux, Fedora, Ubuntu, Debian, SUSE Linux Enterprise Server (SLES), as well as products, Firefox, Chromium, JRE. We aim to make it as easy as possible to write new and maintain existing security content in all the commonly used formats. "SCAP content" refers to documents in the XCCDF, OVAL and Source DataStream formats. These documents can be presented in different forms and by different...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    aws-security-viz

    aws-security-viz

    Visualize your aws security groups

    Need a quick way to visualize your current aws/amazon ec2 security group configuration? aws-security-viz does just that based on the EC2 security group ingress configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Arduino IDE

    Arduino IDE

    Arduino IDE library

    ... to provide a frictionless upgrade. If you need assistance, see the Help Center and browse the forum. If you think you found a vulnerability or other security-related bug in this project, please read our security policy and report the bug to our Security Team. The builds are generated every day at 03:00 GMT from the main branch and should be considered unstable.
    Downloads: 125 This Week
    Last Update:
    See Project
  • Intelligent network automation for businesses and organizations Icon
    Intelligent network automation for businesses and organizations

    Network automation for the hybrid multi-cloud era

    BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.
  • 5
    GHunt

    GHunt

    Offensive Google framework

    ... followed Firefox guidelines to use the Promise-based WebExtension/BrowserExt API being standardized by the W3 Browser Extensions group, and is using webextension-polyfill to provide cross-browser compatibility with no changes.
    Downloads: 36 This Week
    Last Update:
    See Project
  • 6
    UACMe

    UACMe

    Defeating Windows user account control

    Run executable from command line, akagi32 [Key] [Param] or akagi64 [Key] [Param]. First parameter is a number of methods to use, second is an optional command (executable file name including full path) to run. The second parameter can be empty - in this case, the program will execute elevated cmd.exe from the system32 folder. Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    Terrascan

    Terrascan

    Detect compliance and security violations across Infrastructure

    Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure. As you embrace Infrastructure as Code (IaC) such as Terraform, Kubernetes, Argo CD, Atlantis and AWS CloudFormation, it is important to ensure that security best practices and compliance requirements are observed. Terracan provides 500+ out-of-the-box policies so that you can scan IaC against common policy standards such as the CIS Benchmark. It leverages...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 8
    Harbor

    Harbor

    An open source trusted cloud native registry project that stores

    Harbor is an open-source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open-source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build-and-run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 9
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc. SimpleX does not, not even random numbers. This radically improves your privacy. The video shows how you connect to your friend via their 1-time QR-code, in person or via a video link. You can also connect by sharing an invitation link. Temporary anonymous pairwise identifiers SimpleX uses temporary anonymous pairwise addresses and credentials for each user contact or group member. It allows to deliver messages without...
    Downloads: 10 This Week
    Last Update:
    See Project
  • Precoro helps companies spend smarter Icon
    Precoro helps companies spend smarter

    Fully Automated Process in One Tool: From Purchase Orders to Budget Control and Reporting.

    For minor company expenses, you might utilize a spend management solution or track everything in spreadsheets. For everything more, you'll need Precoro. We help companies achieve procurement excellence and budget efficiency by building transparent, predictable, automated spending workflows.
  • 10
    Flask App Builder

    Flask App Builder

    Simple and rapid application development framework

    Simple and rapid application development framework, built on top of Flask. includes detailed security, auto CRUD generation for your models, google charts and much more. Automatic permissions lookup, based on exposed methods. Inserts on the Database all the detailed permissions possible on your application. Public (no authentication needed) and Private permissions. Role-based permissions. Authentication support for OpenID, Database and LDAP. Support for self-user registration. Automatic, Add...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11
    OAuth2 Proxy

    OAuth2 Proxy

    A reverse proxy that provides authentication with Google, Azure, etc.

    A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. If you are running a version older than v6.0.0 we strongly recommend you please update to the current version. After returning from the authentication provider, the OAuth tokens are stored in the configured session store (cookie, redis, ...) and a cookie is set. The request is forwarded to the upstream server with added user info...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 12
    Tox

    Tox

    A New Kind of Instant Messaging

    Tox is a peer to peer (serverless) instant messenger that focuses on security and privacy. In today's world where digital surveillance is rampant, Tox offers users a communication software alternative that's free from prying eyes and ears, and is, quite literally free and without advertising. Tox comes with all the great features you'd expect from an instant messenger application, including voice calls, video calls, file sharing and screen sharing. Everything done on Tox is encrypted using...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    Vault

    Vault

    Tool for secrets management and encryption as a service

    Manage secrets and protect sensitive data. Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. The shift from static, on-premise infrastructure to dynamic, multi-provider infrastructure changes the approach to security. Security in static infrastructure relies on dedicated servers, static IP addresses, and a clear network perimeter. Security in dynamic infrastructure is defined...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    Rancher

    Rancher

    Complete container management platform

    From datacenter to cloud to edge, Rancher lets you deliver Kubernetes-as-a-Service. Rancher is a complete software stack for teams adopting containers. It addresses the operational and security challenges of managing multiple Kubernetes clusters, while providing DevOps teams with integrated tools for running containerized workloads. From datacenter to cloud to edge, Rancher's open source software lets you run Kubernetes everywhere. You don’t need to figure Kubernetes out all on your own...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    Cerbos

    Cerbos

    Cerbos is the open core, language-agnostic authorization solution

    ... on delivering exceptional products, not maintaining the authorization infrastructure. Context-aware role definitions and attribute-based access control. Implement adaptable, granular security policies that exceed standard role-based access control.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Prowler

    Prowler

    An open source security tool to perform AWS security assessment

    Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and forensics readiness. It contains more than 200 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks. Prowler is a command-line tool that helps you with AWS security assessment, auditing, hardening, and incident response. It follows guidelines of the CIS Amazon Web Services...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    KubeArmor

    KubeArmor

    Runtime Security Enforcement System

    KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, and 5G networks. It enforces policy-based controls. KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, and 5G networks. It enforces policy-based controls. KubeArmor lessens the attack surface on pods, containers, and virtual machines...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Laravel CSP

    Laravel CSP

    Set content security policy headers in a Laravel app

    By default, all scripts on a webpage are allowed to send and fetch data to any site they want. This can be a security problem. Imagine one of your JavaScript dependencies sends all keystrokes, including passwords, to a third party website. It's very easy for someone to hide this malicious behaviour, making it nearly impossible for you to detect it (unless you manually read all the JavaScript code on your site). For a better idea of why you really need to set content security policy headers...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Element Android

    Element Android

    A glossy Matrix collaboration client for Android

    Element Android is a glossy Matrix collaboration client for Android, based on a new Android SDK fully written in Kotlin. A total rewrite of Riot-Android, Element is an all-in-one secure chat app made possible through the open global Matrix network. It is a messenger that allows users to talk to anyone regardless of their app, while providing unparalleled privacy and security. It protects conversations from data-mining and ads with proper end-to-end encryption, so you can feel totally secure...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    AWS IAM Authenticator for Kubernetes

    AWS IAM Authenticator for Kubernetes

    Tool to use AWS IAM credentials to authenticate to Kubernetes clusters

    A tool to use AWS IAM credentials to authenticate to a Kubernetes cluster. A tool to use AWS IAM credentials to authenticate to a Kubernetes cluster. The initial work on this tool was driven by Heptio. The project receives contributions from multiple community engineers and is currently maintained by Heptio and Amazon EKS OSS Engineers. If you are an administrator running a Kubernetes cluster on AWS, you already need to manage AWS IAM credentials to provision and update the cluster. By using...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Antrea

    Antrea

    Kubernetes networking based on Open vSwitch

    Antrea is a Kubernetes-native project that implements the Container Network Interface (CNI) and Kubernetes NetworkPolicy thereby providing network connectivity and security for pod workloads. Antrea extends the benefit of programmable networks from Open vSwitch (OVS) to Kubernetes. Antrea simplifies Kubernetes networking across differing clouds and operating systems with a unified network stack built atop Open vSwitch. Antrea is designed to ease deployment, operations and troubleshooting...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Telegram API Library

    Telegram API Library

    Complete async capable Telegram bot API implementation for PHP7

    This is a PHP7 bot API implementation for Telegram implementing the vast majority of Bot API up until v4.7. The only thing it does not implement is Telegram Passport which was introduced in Bot API v4.0. It is unlikely to be introduced as it may introduce security vulnerabilities. However, if you think you have a strong case for the need, feel free to let me know. Enables you to anything supported by the Telegram Bot API: messages, stickers, location, inline bots and any other supported method...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    kube-score

    kube-score

    Kubernetes object analysis with recommendations

    Kubernetes object analysis with recommendations for improved reliability and security. kube-score is a tool that does static code analysis of your Kubernetes object definitions. The output is a list of recommendations of what you can improve to make your application more secure and resilient. kube-score is open-source and available under the MIT-license. Container limits (should be set) Pod is targeted by a NetworkPolicy, both egress and ingress rules are recommended. Deployments...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Vieb

    Vieb

    Vim bindings for the web by design

    Free, open source, fast and secure. Local first adblocking, auto-complete, AMP protection, custom redirects and more, all without web requests. Privacy with strict permission system, navigator overrides, custom useragent, custom WebRTC policy and more. Accessible with custom themes, full interface & fontsize scaling, page zooming, spellcheck and mouse support. Security settings with permissions, cache usage, cookie management, (auto-)download settings and more. Window splitting with buffer...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Jitsi Meet

    Jitsi Meet

    Secure, simple and scalable video conferences application

    Go ahead, video chat with the whole team. In fact, invite everyone you know. Jitsi Meet is a fully encrypted, 100% open source video conferencing solution that you can use all day, every day, for free — with no account needed. Head over to meet.jit.si and see the service in action before you decide whether you’d like to run your own instance. For those interested, check out the meet.jit.si terms of service and privacy policy. Yep, it’s free — and it’s technologically advanced, too. In fact...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next