Cremit Alternatives

Cremit is described as 'All-in-one credential security platform designed for developers and security teams. This service integrates with source code version control systems, collaboration tools, and messaging platforms to effectively detect and manage secret information' and is an app in the security & privacy category. There are nine alternatives to Cremit for Mac, Windows, Linux, Self-Hosted and SaaS. The best Cremit alternative is GitGuardian. It's not free, so if you're looking for a free alternative, you could try GitGuardian or yara4pentesters. Other great apps like Cremit are Gitrob, Gitleaks, truffleHog and AWS Lab's git-secrets.

Copy a direct link to this comment to your clipboard
Cremit alternatives page was last updated

Alternatives list

  1. GitGuardian icon
     1 like
    Copy a direct link to this comment to your clipboard

    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries.

    11 GitGuardian alternatives

    Cost / License

    • Free Personal
    • Proprietary

    Platforms

    • Self-Hosted
    • Software as a Service (SaaS)
     
    • GitGuardian is the most popular SaaS & Self-Hosted alternative to Cremit.

    • GitGuardian is the most popular free alternative to Cremit.

    • GitGuardian is Free Personal and ProprietaryCremit is Freemium and Proprietary
  2. Copy a direct link to this comment to your clipboard

    rules to identify files containing juicy information like usernames, passwords etc - DiabloHorn/yara4pentesters

    Cost / License

    • Free
    • Open Source

    Platforms

    • Mac
    • Windows
    • Linux
     
    • yara4pentesters is the most popular Windows, Mac & Linux alternative to Cremit.

    • yara4pentesters is the most popular Open Source alternative to Cremit.

    • yara4pentesters is Free and Open SourceCremit is Freemium and Proprietary
  3. Copy a direct link to this comment to your clipboard

    detect-secrets is an aptly named module for (surprise, surprise) detecting secrets within a code base.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Mac
    • Windows
    • Linux
     
  4. Gitrob icon
     Like
    Copy a direct link to this comment to your clipboard

    Gitrob is a tool to help find potentially sensitive files pushed to public repositories on Github. Gitrob will clone repositories belonging to a user or organization down to a configurable depth and iterate through the commit history and flag files that match signatures for...

    Cost / License

    • Free
    • Open Source

    Alerts

    • Discontinued

    Platforms

    • Mac
    • Windows
    • Linux
     
  5. Gitleaks icon
     Like
    Copy a direct link to this comment to your clipboard

    Audit git repos for secrets. Gitleaks provides a way for you to find unencrypted secrets and other unwanted data types in git source code repositories. As part of it's core functionality, it provides;

    Cost / License

    • Free
    • Open Source

    Platforms

    • Mac
    • Windows
    • Linux
     
  6. Copy a direct link to this comment to your clipboard

    Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accidentally committed.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Mac
    • Windows
    • Linux
     
  7. Copy a direct link to this comment to your clipboard

    git-secrets scans commits, commit messages, and --no-ff merges to prevent adding secrets into your git repositories. If a commit, commit message, or any commit in a --no-ff merge history matches one of your configured prohibited regular expression patterns, then the commit is...

    Cost / License

    • Free
    • Open Source

    Platforms

    • Mac
    • Windows
    • Linux
     
  8. Copy a direct link to this comment to your clipboard

    It happens sometimes that you can commit secrets or passwords to your repository by accident. The recommended best practice is not commit the secrets, that's obvious. But not always that obvious when you have a big merge waiting to be reviewed.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Mac
    • Windows
    • Linux
     
  9. Copy a direct link to this comment to your clipboard

    CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys - UKHomeOffice/repo-security-scanner

    Cost / License

    • Free
    • Open Source

    Platforms

    • Mac
    • Windows
    • Linux
     
9 of 9 Cremit alternatives