CloudJack assesses AWS accounts for subdomain hijacking vulnerabilities as a result of decoupled Route53 and CloudFront configurations. This vulnerability exists if a Route53 alias references 1) a deleted CloudFront web distribution or 2) an active CloudFront web distribution with deleted CNAME(s). Exploitation of this vulnerability results in the ability to spoof the victim's web site content, which otherwise would have been accessed through the victim's account.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05
A list of vulnerable applications for testing and learning
Python-based extension for integrating a Yara scanner into Burp Suite for on-demand website scans based on custom rules.
Automate software supply chain security by blocking malicious open source components
A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers
Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.
A comprehensive open dictionary of fault injection patterns and predictable resource locations for dynamic application security testing
A tool to run YARA rules against node_module folders to identify suspicious scripts
An extensible, heuristic-based vulnerability scanning tool for installed npm packages.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.