A walkthrough of security controls for a serverless architecture via a demo application
☆11May 11, 2022Updated 3 years ago
Alternatives and similar repositories for secure-serverless-reference-architecture
Users that are interested in secure-serverless-reference-architecture are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- [CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE☆18Mar 17, 2025Updated last year
- ☆23Feb 20, 2023Updated 3 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- HomeLab Setup with a Firewall, SIEM Solution, Exploitable machines and Attacker.☆31Jul 20, 2022Updated 3 years ago
- Supplemental templates for securing the cloud.☆37Apr 1, 2025Updated 11 months ago
- PoC of CVE-2020-0108☆11Aug 5, 2020Updated 5 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Aug 4, 2018Updated 7 years ago
- Jboss Java Deserialization RCE (CVE-2017-12149)☆13Aug 22, 2019Updated 6 years ago
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- ☆14Sep 30, 2020Updated 5 years ago
- ☆15May 22, 2021Updated 4 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- ☆23Jul 28, 2020Updated 5 years ago
- CVE-2020-9548:FasterXML/jackson-databind 远程代码执行漏洞☆24Mar 2, 2020Updated 6 years ago
- templates for our relays☆12Mar 26, 2018Updated 7 years ago
- This is a WIP. Here be dragons.☆12Jun 28, 2019Updated 6 years ago
- ☆50Mar 20, 2025Updated last year
- CVE-2015-4852、CVE-2016-0638、CVE-2016-3510、CVE-2019-2890漏洞POC☆17Aug 11, 2020Updated 5 years ago
- MD5长度扩展攻击☆40Jun 8, 2016Updated 9 years ago
- 技术文章☆22Feb 7, 2025Updated last year
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- ☆28Jul 5, 2023Updated 2 years ago
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process…☆25Dec 13, 2020Updated 5 years ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25May 31, 2020Updated 5 years ago
- Example architecture of a serverless multi-tenant environment☆21Aug 9, 2022Updated 3 years ago
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆66Jan 20, 2026Updated 2 months ago
- A simpler way to use Aurora Serverless Data API with Python.☆28Dec 8, 2022Updated 3 years ago
- java 漏洞平台包含各种CVE☆23Jun 17, 2022Updated 3 years ago
- Some files for bruteforcing certain things.☆25Jul 12, 2021Updated 4 years ago
- CVE-2020-9547:FasterXML/jackson-databind 远程代码执行漏洞☆23Mar 2, 2020Updated 6 years ago
- SAM application for creating Billing Conductor custom line items to distribute SP/RI benefits purchased outside of billing groups☆17May 22, 2024Updated last year