IAM
User accounts, authentication and authorization.
Contents
Security
Account Management
Privacy
Anonymization
Cryptography
Zero-trust Network
Identity & Access Proxy and Access Control Decision API that authenticates, authorizes, and mutates incoming HTTP requests. Inspired by the BeyondCorp / Zero Trust white paper.
Password-based auth
Multi-factor auth
Password-less auth
Security key
Public-Key Infrastructure (PKI)
Acts as a broker between CAs and environments, providing a central portal for developers to issue TLS certificates with 'sane' defaults.
JWT
Authorization
RBAC frameworks
ABAC frameworks
ReBAC frameworks
An open source database system for managing security-critical application permissions inspired by Zanzibar.
Another open-source authorization as a service inspired by Google Zanzibar, and see how it compares to other Zanzibar-inspired tools.
An open-source project which combines the policy-as-code and decision logging of OPA with a Zanzibar-modeled directory.
AWS policy tools
Writing security-conscious IAM Policies by hand can be very tedious and inefficient. Policy Sentry helps users to create least-privilege policies in a matter of seconds.
AWS IAM policy statement generator with fluent interface. Helps with creating type safe IAM policies and writing more restrictive/secure statements by offering conditions and ARN generation via IntelliSense. Available for Node.js, Python, .Net and Java.
GitOps for IAM. The Terraform of Cloud IAM. IAMbic is a multi-cloud identity and access management (IAM) control plane that centralizes and simplifies cloud access and permissions. It maintains an eventually consistent, human-readable, bi-directional representation of IAM in version control.
OAuth2 & OpenID
A curated list of providers, services, libraries, and resources for OpenID Connect.
Open-source Identity and Access Management. Supports OIDC, OAuth 2 and SAML 2, LDAP and AD directories, password policies.
A UI-first centralized authentication / Single-Sign-On (SSO) platform based. Supports OIDC and OAuth 2, social logins, user management, 2FA based on Email and SMS.
An Open-Source solution built with Go and Angular to manage all your systems, users and service accounts together with their roles and external identities. ZITADEL provides you with OIDC, OAuth 2.0, login & register flows, passwordless and MFA authentication. All this is built on top of eventsourcing in combination with CQRS to provide a great audit trail.
A simple authentication system which only implements the relevant parts of the OAuth2 standards.
Secret Management
Secure, store and tightly control access to tokens, passwords, certificates, encryption keys.
Editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP.
Hardware Security Module (HSM)
Trust & Safety
User Identity
Fraud
“A concise definition of Threat Intelligence: evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard.”
An open source intelligence (OSINT) automation tool. It integrates with just about every data source available and uses a range of methods for data analysis, making that data easy to navigate.
that can be leveraged by scammers =to bypass security or fool users.
Collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
CSV database of email addresses used by threat actor in phishing kits.
Tools to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy. Then search for footprints on search engines to try to find the VoIP provider or identify the owner.
Reference all open-source captcha libraries, integration, alternatives and cracking tools.
Blocklists
Hostnames and Subdomains
Consolidates reputable hosts files, and merges them into a unified hosts file with duplicates removed.
Extensive collection of list for security, privacy and parental control.
Mozilla's registry of public suffixes, under which Internet users can (or historically could) directly register names.
Emails
A list of temporary email providers. And its derivative Python module.
Cross-language temporary (disposable/throwaway) email detection library.
A list of domains for disposable and temporary email addresses. Useful for filtering your email list to increase open rates (sending email to these domains likely will not be opened).