http-observatory
pam-u2f
Our great sponsors
http-observatory | pam-u2f | |
---|---|---|
33 | 3 | |
1,816 | 517 | |
0.6% | 1.5% | |
8.0 | 6.0 | |
17 days ago | 25 days ago | |
Python | C | |
Mozilla Public License 2.0 | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
http-observatory
-
What are the actual security implications of port forwarding?
Detectify once made an offer of making free scans which I took them up on. There are plenty of free Content Security Policy (CSP) and other vulnerability checkers around such as Observatory or Pentest. Shields UP!! will identify which ports you have open.
-
200 Web-Based, Must-Try Web Design and Development Tools
Website Headers Analyzer (Mozilla)
- Open source cookie scanner
- I made inline styles CSP-compliant in .NET 6+. Here's how
-
Deploy a static site to AWS S3 and CloudFront using AWS CDK
scan our site with Mozilla Observatory and improve our grade by registering a domain name, enabling HTTPS, adding a certificate and setting security headers
-
Simple "Frictionless" Authentication that is Secure "Enough"
First, for session persistence, go with the default Django session with cookie storage. Set your cookie to HTTP only and ensure your application uses the most common HTTP security headers and controls. Test your application with https://observatory.mozilla.org/ to have an idea of what you're missing.
-
Any tool to check the security of my server?
Mozilla Observatory
-
How to explain styled-components to a vanilla JS fanatic
See https://observatory.mozilla.org and https://github.com/styled-components/styled-components/issues/2363 and https://content-security-policy.com/examples/allow-inline-style/
-
My wordpress page sends a lot of "shady" requests to a site called "brounelink.com". Why? How to debugg where this is coming from?
Rank your site on https://observatory.mozilla.org/ and it will give you some suggestions.
- WaPo: Stealthy Kherson resistance fighters undermined Russian occupying forces
pam-u2f
What are some alternatives?
django-csp - Content Security Policy for Django.
virtual-fido - A Virtual FIDO2 USB Device
ssh_scan - DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)
hardening - Hardening Ubuntu. Systemd edition.
http-headers-security - HTTP Headers Security Cheat Sheet
yubikey-full-disk-encryption - Use YubiKey to unlock a LUKS partition
observatory-cli
bastion - 🔒Secure Bastion implemented as Docker Container running Alpine Linux with Google Authenticator & DUO MFA support
tls-scan - An Internet scale, blazing fast SSL/TLS scanner ( non-blocking, event-driven )
lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
jspaint.exe - 🌂JS Paint ~~ as a cross-platform native desktop app. In other words, the "🎨 Classic MS Paint, REVIVED + ✨Extras".exe hehe
pam-onelogin - pam-onelogin is a pretty complete pam/nss stack for using OneLogin as authentication source (with MFA) and user/group lookups. Primarily used for SSH.