Agent-less vulnerability scanner for Linux, FreeBSD, Container Image, Running Container, WordPress, Programming language libraries, Network devices
-
Updated
Jun 3, 2020 - Go
Agent-less vulnerability scanner for Linux, FreeBSD, Container Image, Running Container, WordPress, Programming language libraries, Network devices
Describe the bug
Online docs for NETW-3200 are not yet implemented.
Version
Expected behavior
A (minimal) description of the problem should exist and ideally a general direction on how to fix the issue.
Output
A new discovery!
Oops, looks like this control is not listed yet in the database.
Want to help
WPScan is a free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their WordPress websites.
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'what's in it' using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
When I run a scan against a very long URL, word wrap breaks in the results.
There are several issues open that suggest that it is unclear how Bandit is meant to be executed. In fact, there are no usage instructions at all in the Bandit docs.
Describe the solution you'd like
There should be simple, crisp, usage instructions in the Bandit docs, e.g.
Install Bandit:
pip install banditRun Bandit o
Cobra version: 2.0.0-alpha.5
Python version: 2.7.10
Operating system: Darwin-15.5.0-x86_64-i386-64bit
Command line: cobra.py -t tests/vulnerabilities/ -r CVI-167001.xml
Traceback (most recent call last):
File "/Users/Viarus/Documents/cobra/cobra/__init__.py", line 82, in main
cli.start(args.target, args.format, args.output, args.special_rules, a_sid)
Official Black Hat Arsenal Security Tools Repository
A high performance offensive security tool for reconnaissance and vulnerability scanning
大型内网渗透扫描器&Cobalt Strike,Ladon6.5内置70个模块,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、Weblogic、ActiveMQ、Tomcat、Struts2系列,密码口令爆破(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、LDAP、SmbHash、WmiHash、Winrm),远程执行命令(wmiexe/psexec/atexec/sshexec/jspshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Advanced vulnerability scanning with Nmap NSE
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
GitHub Sensitive Information Leakage(GitHub敏感信息泄露监控)
Calling all pentesters and/or people like myself who find infosec pretty neat!
Do you have any cool Shodan.io queries that you've come across — cool, funny, interesting, scary, facepalm-inducing, or otherwise? Some examples of IOT gems we've already found are electronic billboards with banks advertising free donuts, gas station pumps around the country, X-ray machines, 3D p
nodejsscan is a static security code scanner for Node.js applications.
A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
Application Layer DoS attack simulator
now that we're getting a few more contributers, standardize on ubuntu / osx as the dev os, and include more instructions here: https://github.com/intrigueio/intrigue-core/wiki/Setting-up-a-Test-Environment-on-Ubuntu-Linux
A default credential scanner.
Kubernetes object analysis with recommendations for improved reliability and security
X Attacker Tool
Open-Source Security Architecture | 开源安全架构
Simple Golang HTTPS/TLS Examples
Enumeration sub domains(枚举子域名)
The following things should be fixed:
column: old => newAlso, consider:
select as a base for detailedJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Golang安全资源合集
Add a description, image, and links to the security-scanner topic page so that developers can more easily learn about it.
To associate your repository with the security-scanner topic, visit your repo's landing page and select "manage topics."
The rule would raise info alerts for each script it found along with the integrety hash, as per
https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity
This could just work on URLs that are in scope - it would just be useful when you're trying to create a CSP for a specific site.