A curated list of Awesome Threat Intelligence resources
created at Dec. 21, 2015, 11:31 a.m.
The Google Cloud Developer's Cheat Sheet
created at Nov. 27, 2018, 7:07 p.m.
Policy and data administration, distribution, and real-time updates on top of Policy Agents (OPA, Cedar, ...)
created at Feb. 14, 2021, 11:37 a.m.
The most scalable and customizable permission server on the market. Fix your slow or broken permission system with Google's proven "Zanzibar" approach. Supports ACL, RBAC, and more. Written in Go, cloud native, headless, API-first. Available as a service on Ory Network and for self-hosters.
created at March 17, 2018, 10:40 a.m.
A place for creators and users of password managers to collaborate on resources to make password management better.
created at March 19, 2020, 8:33 p.m.
Learn how to use JSON Web Token (JWT) to secure your next Web App! (Tutorial/Example with Tests!!)
created at Jan. 29, 2015, 11:18 a.m.
A cloud native Identity & Access Proxy / API (IAP) and Access Control Decision API that authenticates, authorizes, and mutates incoming HTTP(s) requests. Inspired by the BeyondCorp / Zero Trust white paper. Written in Go.
created at Sept. 25, 2017, 11:04 a.m.
a list of disposable and temporary email address domains
created at Sept. 2, 2014, 8:31 p.m.
Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.
created at Feb. 27, 2019, 12:16 a.m.
A compilation of sites with dumb password rules.
created at Dec. 4, 2016, 2:47 p.m.
List of Dirty, Naughty, Obscene, and Otherwise Bad Words
created at March 9, 2012, 2:15 a.m.