metlo-labs / csp-report-listenerLinks
☆49Updated 2 years ago
Alternatives and similar repositories for csp-report-listener
Users that are interested in csp-report-listener are comparing it to the libraries listed below
Sorting:
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated 2 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- NIST-based CVE lookup store and API powered by Rust.☆135Updated 2 months ago
- A domain name permutation and enumeration library powered by Rust.☆129Updated last week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆113Updated this week
- ☆39Updated last year
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 6 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 7 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Modron - Cloud security compliance☆34Updated 11 months ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆92Updated 2 weeks ago
- ☆37Updated 6 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 3 years ago
- A tool to uncover undocumented APIs from the AWS Console.☆114Updated 6 months ago
- AWS STS token decoder☆42Updated 8 months ago
- Open Source External Attack Surface Management☆49Updated last year
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 2 months ago
- Security tool against dependency typosquatting attacks☆54Updated this week
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆123Updated 3 weeks ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated this week
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆82Updated 4 years ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆249Updated 2 weeks ago
- ☆51Updated 2 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆46Updated 3 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated last week
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆73Updated 7 months ago
- ☆23Updated last year
- Modular web-application honeypot platform built using go and gin☆61Updated last year
- PII detection platform, leveraging human-in-the-loop AI☆53Updated 11 months ago