notary
Content Verifier
A system that enables secure distribution and verification of content through the use of timestamps and hierarchical key management.
Notary is a project that allows anyone to have trust over arbitrary collections of data
3k stars
114 watching
510 forks
Language: Go
last commit: 4 months ago
Linked from 3 awesome lists
cncfdockertrust
Related projects:
Repository | Description | Stars |
---|---|---|
distribution/distribution | A toolkit for storing and distributing container content using the OCI Distribution Specification. | 9,002 |
cryptomator/cryptomator | Client-side encryption software that protects data stored in cloud storage services | 11,837 |
binwiederhier/ntfy | A simple HTTP-based service for sending notifications to devices via scripts | 18,461 |
google/trillian | A transparent data store with cryptographic verifiability, built on top of a scalable Merkle tree and an append-only log. | 3,553 |
yeoman/yeoman | Automating development workflow for building web applications | 10,083 |
keycloak/keycloak | A suite of tools and services for authenticating users and managing access to applications and services | 23,473 |
filosottile/mkcert | Automates locally-trusted SSL certificates for development environments. | 50,197 |
codenotary/immudb | A database designed to protect sensitive data with tamper-evident and verifiable capabilities, allowing for secure storage without relying on trust in the database itself. | 8,632 |
twitter/finagle | A fault-tolerant, protocol-agnostic RPC system for high-performance servers. | 8,790 |
malwaredllc/byob | An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence. | 8,989 |
pomerium/pomerium | An access proxy service providing secure, clientless connections to internal web apps and services. | 4,052 |
undeadsec/socialfish | A tool for simulating phishing attacks and gathering information on targeted systems and users. | 4,113 |
rsmusllp/king-phisher | A tool for simulating real-world phishing attacks to test user awareness and promote security | 2,269 |
bc-security/empire | A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks. | 4,258 |
pallets/itsdangerous | Provides a way to securely transmit and verify data between untrusted environments | 2,932 |