Stars
eBPF-based Security Observability and Runtime Enforcement
Notes on books I read, talks I watch, articles I study, and papers I love
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
vah13 / jar-analyzer
Forked from jar-analyzer/jar-analyzer-v1-guiOn this fork the GUI is translated to English. A GUI tool for analyzing Jar packages, you can search for the information you want in multiple ways, automatically build method call relationships, an…
An open platform for training, serving, and evaluating large language models. Release repo for Vicuna and Chatbot Arena.
YTsaurus is a scalable and fault-tolerant open-source big data platform.
Starlark in Go: the Starlark configuration language, implemented in Go
A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
Burp Suite Certified Practitioner Exam Study
Go client to communicate with Chaos DB API.
Superseded by https://github.com/aquasecurity/trivy-operator
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
The Generative AI Landscape - A Collection of Awesome Generative AI Applications
Robust Speech Recognition via Large-Scale Weak Supervision
System of Orchestration, Lifecycle control, Detection and Response
GitLab CI security tools runner
Site Reliability Engineer Interview Preparation Guide
sorted zines that collected from Julia Evans @b0rk twitter
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A curated list of SBOM (Software Bill Of Materials) related tools, frameworks, blogs, podcasts, and articles
A collection of inspiring resources related to engineering management and tech leadership
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.
Prevent Kubernetes misconfigurations from reaching production (again 😤 )! From code to cloud, Datree provides an E2E policy enforcement solution to run automatic checks for rule violations. See our…