aws / http-desync-guardianLinks
Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
☆271Updated 4 years ago
Alternatives and similar repositories for http-desync-guardian
Users that are interested in http-desync-guardian are comparing it to the libraries listed below
Sorting:
- A command line interface for Amazon EBS snapshots☆250Updated last week
- Rust libraries and tools for using and generating TUF repositories☆215Updated 2 weeks ago
- DEPRECATED - web security checklist for Firefox Services☆77Updated 4 years ago
- k8s audit repo☆229Updated 6 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- No need for IAM users when we have Yubikeys☆159Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 7 months ago
- A production-friendly malware scanner for your AWS cloud☆200Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Updated 3 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- ☆144Updated 2 weeks ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 4 years ago
- Resource types that can be publicly exposed on AWS☆329Updated 3 years ago
- Security scanning & static analysis tool☆93Updated last year
- ☆83Updated 6 years ago
- ☆66Updated 6 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Updated 7 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Updated 2 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Updated 4 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)☆40Updated last month
- GCP CSPM using Google Sheets☆37Updated 8 months ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- AWS Red Team Orchestration Framework☆102Updated 8 years ago
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- A crowdsourced AWS IAM permissions reference.☆101Updated 3 months ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Updated 6 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆327Updated last year