applied-security
introspector
applied-security | introspector | |
---|---|---|
3 | 1 | |
6 | 66 | |
- | - | |
10.0 | 0.0 | |
over 1 year ago | over 2 years ago | |
JavaScript | Python | |
Creative Commons Zero v1.0 Universal | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
applied-security
- applied-security: A collection of publicly available resources on how technology and tech-savvy organizations around the world practice Cybersecurity.
- Applied Security
-
Applied Security – a curated collection on Cybersecurity
The link to repo https://github.com/upgundecha/applied-security
introspector
-
Open source: Catch AWS resource policy backdoors
And if you want to do some code review, it depends on supabase's postgres container and introspector
What are some alternatives?
ZeusCloud - Open Source Cloud Security
PMapper - A tool for quickly evaluating IAM permissions in AWS.
Prowl-API - Prowl is an API that allows you to send IP and in return obtain the reputation of the IP as well as indicators of attacks and indicators of compromise associated with the address. Lupovis monitors the web in real time and identifies malicious IP addresses for you.
iamzero-python - Identity & Access Management simplified and secure for Python scripts and applications.
rawsec-cybersecurity-inventory - An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
rds-auth-proxy - A "passwordless" login experience for your AWS RDS
njsscan - njsscan is a semantic aware SAST tool that can find insecure code patterns in your Node.js applications.
ElectricEye - ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
aws-allowlister - Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks.
metabadger - Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
varc - Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
awspx - A graph-based tool for visualizing effective access and resource relationships in AWS environments.