NHP: A lightweight cryptography-driven Zero Trust networking protocol at the OSI 5th layer to hide your server and data from attackers.
-
Updated
Nov 8, 2024 - Go
NHP: A lightweight cryptography-driven Zero Trust networking protocol at the OSI 5th layer to hide your server and data from attackers.
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
immudb - immutable database based on zero trust, SQL/Key-Value/Document model, tamperproof, data change history
Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.
8 Lessons, Kick-start Your Cybersecurity Learning.
Pomerium is an identity and context-aware access proxy.
Boundary enables identity-based access management for dynamic infrastructure.
🌀 Browse the web from a web page. Remote browser isolation. For security, privacy and more! By https://dosyago.com
The parent project for OpenZiti. Here you will find the executables for a fully zero trust, application embedded, programmable network @openziti
Geo-scale, next-generation peer-to-peer sharing platform built on top of OpenZiti.
LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Warrant is a highly scalable, centralized authorization service based on Google Zanzibar. Use it to define, enforce, query, and audit application authorization and access control.
Single Packet Authorization > Port Knocking
A curated collection of awesome resources for the zero-trust security model.
Zero Trust Service Access
chai - Experience Zero Trust security with Chai! Convert and view documents as vivid images right in your browser. No mandatory downloads, no hassle—just pure, joyful security! 🌈
The world's most powerful System Activity Monitor Engine · 一款功能强大的终端行为采集防御开发套件 ~ 旨在帮助EDR、零信任、数据安全、审计管控等终端安全软件可以快速实现产品功能, 而不用关心底层驱动的开发、维护和兼容性问题,让其可以专注于业务开发
Manage network policies, AWS, GCP & Azure IAM policies, Istio Authorization Policies, and Kafka ACLs in a Kubernetes cluster with ease.
Add a description, image, and links to the zero-trust topic page so that developers can more easily learn about it.
To associate your repository with the zero-trust topic, visit your repo's landing page and select "manage topics."