Stars
The communications platform that puts data protection first.
Record-and-replay Kubernetes simulator based on KWOK
Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..
Configures opinionated GKE clusters
🛡 I2P: End-to-End encrypted and anonymous Internet
Enterprise-ready zero-trust access platform built on WireGuard®.
Declarative Continuous Deployment for Kubernetes
OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
Sets up a new VPC network on Google Cloud
open source, cloud-native, graph-based asset inventory
OpenTofu lets you declaratively manage your cloud infrastructure.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
The global orchestration solution to manage and backup XCP-ng and XenServer.
AWX provides a web-based user interface, REST API, and task engine built on top of Ansible. It is one of the upstream projects for Red Hat Ansible Automation Platform.
eBPF-based Networking, Security, and Observability
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad w…
Nomad is an easy-to-use, flexible, and performant workload orchestrator that can deploy a mix of microservice, batch, containerized, and non-containerized applications. Nomad is easy to operate and…
Open-Source Unified Vulnerability Management, DevSecOps & ASPM
Kubernetes cloud-controller-manager for Hetzner Cloud
A Git-based CMS for Static Site Generators
DNS-Blocklists: For a better internet - keep the internet clean!
🐋 Ansible playbook which helps you host various FOSS services as Docker containers on your own server
ArduPlane, ArduCopter, ArduRover, ArduSub source
Fulcrum Core is a comprehensive cloud infrastructure management system designed to orchestrate and monitor distributed cloud resources across multiple providers.
Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (LSM-BPF, AppArmor).