Vulnerable app with examples showing how to not use secrets
Network security scanner for detecting severity vulnerabilities
Use AWS Identity and (IAM) to connect to Amazon Managed Streaming
MaxKey SSO ,Leading-Edge IAM-IDaas(Identity and Access Management)
Keychain Access for React Native
Open source alternative to Auth0 / Firebase Auth, etc.
An authorization library that supports access control models
AWS Encryption SDK
OWASP Coraza WAF is a golang modsecurity compatible firewall library
GitHub Action for license compliance: Python, JavaScript, iOS, Android
Amazon DynamoDB Encryption Client for Python
Add digital signatures to PDF documents - GUI and CLI, cross-platform
Free GUI replacement for Java command-line utilities keytool/jarsigner
Implementation of the EDIINT AS2 protocol (RFC 4130)
AS2 1.1 server implementation in Java
The portable software collection
Implementation of the OFTP2 protocol (RFC 5024)
AS4 Solution for ENTSOG, e-SENS, ebMS, PEPPOL, ICS2, BDEW
Secure wiping/shredding of free disk space with many methods
FIDO® Certified StrongKey FIDO Server (SKFS)
PGP graphical user interface
Dynamic and static analysis with Sandboxie for Windows, including EDR