Teller Logo

Teller

0
Free
Updated 11 March 2025
Visit Website

Never leave your terminal to use secrets while developing, testing, and building your apps. Instead of custom scripts, tokens in your .zshrc files, visible EXPORTs in your bash history, misplaced .env.production files and more around your workstation -- just use teller and connect it to any vault, key store, or cloud service you like (Teller support Hashicorp Vault, AWS Secrets Manager, Google Secret Manager, and many more). You can use Teller to tidy your own environment or for your team as a process and best practice. Quick Start with teller (or tlr) You can install teller with homebrew: $ brew tap spectralops/tap && brew install teller You can now use teller or tlr (if you like shortcuts!) in your terminal. teller will pull variables from your various cloud providers, vaults and others, and will populate your current working session (in various ways!, see more below) so you can work safely and much more productively. teller needs a tellerfile. This is a .teller.yml

FEATURES

SIMILAR TOOLS

A simple drop-in library for managing users, permissions, and groups in your application.

Free

A NodeJS/Typescript library for generating IAM Policy Actions Statements for AWS CDK with predefined constants and a factory class.

Free

An open-source credential management platform that provides end-to-end encrypted password sharing and storage capabilities for organizations.

Commercial

Identify AWS IAM permissions by brute-forcing API calls.

Free

A decentralized identity verification solution that enables organizations to issue, manage, and verify digital credentials for user-owned identity scenarios.

Commercial

OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.

Free

A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.

Free

Pathlock is an identity security platform that provides compliance-focused governance, access management, and continuous controls monitoring across enterprise applications with particular emphasis on ERP systems.

Commercial

This article discusses protected accounts and groups in Active Directory, providing examples and screenshots to illustrate key concepts.

Free
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved