Fast and customizable vulnerability scanner based on simple YAML
A reverse proxy that provides authentication with Google, Azure, etc.
An advanced, yet simple, tunneling/pivoting tool
A Kubernetes operator that simplifies the management of Role Bindings
Mirror of BoringSSL
Tool to use AWS IAM credentials to authenticate to Kubernetes clusters
A transparent and secure way to look up public keys