I looked through attacks in my access logs. Here's what I found

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
InfluxDB high-performance time series database
Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
influxdata.com
featured
  1. NoCommandLine-Analytics

    Private Analytics for Google Cloud Serverless (GAE, Cloud Run)

    Been doing this for Apps deployed to Google App Engine (such attacks are also common to them) and then creating firewall rules blocking those IPs.

    After awhile, I decided to automate the process i.e. build an App [1] that runs on a schedule, parses the logs, identifies such traffic (spam/bots) and automatically creates the firewall rules. Since it's already parsing the logs, it also generates analytics for the Apps

    1. https://github.com/NoCommandLine/NoCommandLine-Analytics

  2. CodeRabbit

    CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.

    CodeRabbit logo
  3. ct-woodpecker

    A tool to monitor a certificate transparency log for operational problems

    Was looking into Certificate Transparency logs recently. Are there any convenient tools/methods for querying CT logs? i.e. search for domains within a timeframe

    Cloudflare’s Merkle Town[0] is useful for getting overviews, but I haven’t found an easy way to query CT logs. ct-woodpecker[1] seems promising, too

    [0] https://ct.cloudflare.com/

    [1] https://github.com/letsencrypt/ct-woodpecker

  4. clair

    Vulnerability Static Analysis for Containers

    Besides pointing pentester tools like metasploit at yourself, there are some nice scanners out there.

    https://github.com/quay/clair

    https://github.com/anchore/grype/

  5. grype

    A vulnerability scanner for container images and filesystems

    Besides pointing pentester tools like metasploit at yourself, there are some nice scanners out there.

    https://github.com/quay/clair

    https://github.com/anchore/grype/

  6. aws-solutions-constructs

    The AWS Solutions Constructs Library is an open-source extension of the AWS Cloud Development Kit (AWS CDK) that provides multi-service, well-architected patterns for quickly defining solutions

    This is helpful! I found some CDK libraries that allows for connecting a load balancer or Cloudfront to WAF with a few lines of code. I'll give it a try! [1] [2].

    --

    1: https://github.com/awslabs/aws-solutions-constructs/tree/mai...

    2: https://constructs.dev/search?q=waf&cdk=aws-cdk&cdkver=2&lan...

  7. UninvitedActivity

    An attempt at creating some kind of auto-updating IP address blocklist

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Day 23: Docker Resources

    4 projects | dev.to | 23 Dec 2024
  • 5 Alternatives to Docker Desktop

    7 projects | dev.to | 24 Jul 2024
  • General Docker Troubleshooting, Best Practices & Where to Go From Here

    3 projects | dev.to | 19 Jan 2024
  • macOS Containers v0.0.1

    24 projects | news.ycombinator.com | 26 Sep 2023
  • Open source container scanning tool to find vulnerabilities and suggest best practice improvements?

    8 projects | /r/selfhosted | 15 Apr 2023

Did you know that Go is
the 4th most popular programming language
based on number of references?