The-OAG-Development-Project / Application-GatewayLinks
OWASP Application Gateway is an HTTP proxy that handles Oauth2 authentication and session management
☆84Updated 3 weeks ago
Alternatives and similar repositories for Application-Gateway
Users that are interested in Application-Gateway are comparing it to the libraries listed below
Sorting:
- Static security checker for Dockerfiles☆94Updated last year
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- ☆35Updated 4 years ago
- ☆10Updated 3 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- A project to visualize the software supply chain☆52Updated last year
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆106Updated 2 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Updated 3 years ago
- OWASP Foundation Web Respository☆27Updated 3 months ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆62Updated 3 months ago
- Sqreen Security Checklist Transformer & Uploader☆27Updated 4 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- ☆63Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated last week
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 9 months ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.☆110Updated 4 months ago
- ☆123Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- ☆19Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Updated 4 months ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago
- Modron - Cloud security compliance☆34Updated 5 months ago