aws / http-desync-guardianLinks
Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
☆265Updated 4 years ago
Alternatives and similar repositories for http-desync-guardian
Users that are interested in http-desync-guardian are comparing it to the libraries listed below
Sorting:
- A command line interface for Amazon EBS snapshots☆225Updated last week
- Resource types that can be publicly exposed on AWS☆327Updated 3 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆326Updated 10 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated last month
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- ☆138Updated 3 months ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆547Updated 4 months ago
- S3 Account Search☆6Updated 7 months ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆916Updated 5 years ago
- Rust libraries and tools for using and generating TUF repositories☆214Updated last week
- Aardvark is a multi-account AWS IAM Access Advisor API☆477Updated 7 months ago
- AWS Security Tools (AST) in a simple Docker container.☆287Updated 4 years ago
- No need for IAM users when we have Yubikeys☆158Updated 3 years ago
- A crowdsourced AWS IAM permissions reference.☆94Updated 3 months ago
- CLI wrapper around aws-encryption-sdk-python☆80Updated 8 months ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆180Updated 6 years ago
- List of vendors that do not allow IMDSv2 enforcement☆142Updated last year
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆443Updated 11 months ago
- Security aspects of AWS products for the Security Specialist certification☆210Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 3 years ago
- Identity & Access Management simplified and secure.☆257Updated 2 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- DEPRECATED - web security checklist for Firefox Services☆74Updated 4 years ago
- Documenting your Threat Models with HCL☆430Updated this week
- for AWS Security material☆247Updated 3 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆440Updated last year
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated last year
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆899Updated 3 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆388Updated 5 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆345Updated 4 years ago