shieldfy / vulnerable-nodejs-project
Demo for vulnerable Nodejs project
β11Updated 7 months ago
Alternatives and similar repositories for vulnerable-nodejs-project:
Users that are interested in vulnerable-nodejs-project are comparing it to the libraries listed below
- π A repo of configuration examples for StackHawk's Hawkscan!β16Updated last month
- Assets and resources used in the Training team's labs.β11Updated 5 months ago
- Sample code snippets for consuming the CloudSploit APIβ13Updated last year
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request thatβ¦β35Updated last year
- An Incident Management Process / Post Mortem Templateβ31Updated 6 years ago
- The original AWS security enforcerβ’β60Updated 5 years ago
- Sample cross-platform Web Application Firewall, used as a security proxy for existing web appsβ15Updated 7 years ago
- The Auditree tool for adding external evidence.β10Updated 5 months ago
- Public tables and other research that can accept PRs. Please visit the web link.β44Updated 5 years ago
- vscode extension for tfsecβ30Updated 2 years ago
- A carefully curated list of open source projects aimed at improving your AWS security posture!β30Updated 2 years ago
- AWS container security survey 2020β11Updated 4 years ago
- Command line client for the Fugue APIβ14Updated last year
- Instance Scheduler based on Serverlessβ16Updated 3 months ago
- A simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sourcesβ28Updated 5 years ago
- β16Updated 2 years ago
- Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Accounβ¦β16Updated 4 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysisβ12Updated 2 months ago
- Github action for linting AWS IAM policy documentsβ37Updated 2 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating dataβ18Updated 3 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.β99Updated 2 months ago
- Offensive Terraform Websiteβ44Updated 4 years ago
- β20Updated 6 years ago
- Static analysis for CloudFormation templates to identify common misconfigurationβ57Updated 3 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.β30Updated 3 years ago
- A demo repo showcasing Snyk's Docker offeringβ30Updated 6 months ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.β19Updated 11 months ago
- his solution helps customers more easily manage their fleet of servers, automate software inventory management, OS patch compliance, and β¦β29Updated last year
- β28Updated 2 years ago
- For use in our Tenable.IO to AWS Security Hub integrationβ28Updated this week