mikewest / strict-csp-for-everyoneLinks
This is both a terrible and wonderful idea.
☆12Updated 6 years ago
Alternatives and similar repositories for strict-csp-for-everyone
Users that are interested in strict-csp-for-everyone are comparing it to the libraries listed below
Sorting:
- Fetch Metadata☆75Updated 8 months ago
- Cookies should take scheme into account, just like every other storage mechanism on the web.☆16Updated 5 years ago
- Signature-based Resource Loading Restrictions☆44Updated 4 months ago
- WebAppSec Content Security Policy☆222Updated last month
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated 2 years ago
- `document.domain` intentionally weakens the only security boundary we have. Perhaps we can dump it?☆17Updated 2 years ago
- Security contract types☆60Updated 3 years ago
- DEPRECATED - web security checklist for Firefox Services☆78Updated 4 years ago
- The Paper Artifact Availability☆21Updated 3 years ago
- Specifications for Privacy Proxy Implementations☆32Updated last month
- ☆16Updated 5 years ago
- Joint task force of Web Authentication WG and Web Payments WG☆15Updated 2 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Updated 4 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- Internet-Draft on IP address privacy☆17Updated 8 months ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated 2 years ago
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- ☆30Updated 4 years ago
- Test suite which checks compliance with CAA checking as defined in version 1.4.8 of the CABF Baseline Requirements☆10Updated last year
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- Certificate Revocation List monitor☆46Updated last year
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- Explainer for Schemeful Same-Site☆15Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆34Updated 7 months ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- A low-cost Certificate Transparency log for deployment in the cloud.☆40Updated last year
- A Security Scanner for Go☆26Updated 6 years ago
- ☆45Updated 4 years ago