aws / http-desync-guardian
Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
☆262Updated 4 years ago
Alternatives and similar repositories for http-desync-guardian:
Users that are interested in http-desync-guardian are comparing it to the libraries listed below
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆63Updated 5 years ago
- Resource types that can be publicly exposed on AWS☆320Updated 2 years ago
- ☆124Updated last month
- No need for IAM users when we have Yubikeys☆158Updated 2 years ago
- DEPRECATED - web security checklist for Firefox Services☆74Updated 4 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆323Updated 6 months ago
- for AWS Security material☆246Updated 2 years ago
- k8s audit repo☆227Updated 5 years ago
- Rust libraries and tools for using and generating TUF repositories☆202Updated this week
- A command line interface for Amazon EBS snapshots☆214Updated this week
- OWASP Cloud Security - Enabling conversations through threat and control stories☆178Updated 6 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆141Updated 10 months ago
- Framework for Testing WAFs (FTW!)☆264Updated last year
- A documentation and tracking project with the goal of making package management systems more secure.☆50Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Updated 3 years ago
- A crowdsourced AWS IAM permissions reference.☆89Updated last month
- ☆135Updated 2 weeks ago
- A tool for identifying misconfigured CloudFront domains☆348Updated 4 years ago
- Security aspects of AWS products for the Security Specialist certification☆208Updated 2 years ago
- AWS Metadata Proxy for protection against SSRF☆67Updated 4 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆453Updated 2 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆75Updated 2 years ago
- ☆153Updated last year
- Example detection of compromise credentials in AWS☆119Updated 6 years ago
- Identity & Access Management simplified and secure.☆251Updated last year
- AWS Serverless Security☆400Updated 2 years ago
- Assume AWS IAM roles from GitHub Actions workflows with no stored secrets☆171Updated 3 years ago
- List of vendors that do not allow IMDSv2 enforcement☆142Updated 8 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated last year