aws / http-desync-guardian
Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
☆262Updated 4 years ago
Alternatives and similar repositories for http-desync-guardian:
Users that are interested in http-desync-guardian are comparing it to the libraries listed below
- Resource types that can be publicly exposed on AWS☆321Updated 2 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆474Updated 3 months ago
- for AWS Security material☆246Updated 2 years ago
- k8s audit repo☆227Updated 5 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆324Updated 6 months ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆292Updated 7 months ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Example detection of compromise credentials in AWS☆120Updated 6 years ago
- ☆125Updated 2 months ago
- AWS Metadata Proxy for protection against SSRF☆67Updated 4 years ago
- AWS Inventory and Compliance Framework☆224Updated last year
- A command line interface for Amazon EBS snapshots☆216Updated 2 weeks ago
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆638Updated 3 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated last year
- ☆154Updated last year
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆436Updated last year
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆538Updated last month
- A tool for identifying misconfigured CloudFront domains☆349Updated 4 years ago
- AWS Security Tools (AST) in a simple Docker container.☆287Updated 3 years ago
- No need for IAM users when we have Yubikeys☆158Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆141Updated 10 months ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆223Updated 4 years ago
- Security aspects of AWS products for the Security Specialist certification☆208Updated 2 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆455Updated 2 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆429Updated 7 months ago
- DEPRECATED - web security checklist for Firefox Services☆74Updated 4 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆377Updated 4 years ago
- Rust libraries and tools for using and generating TUF repositories☆202Updated 2 weeks ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆90Updated 11 months ago
- Scans your AWS cloud resources and generates reports. Check out free hosted version:☆278Updated 4 years ago