Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
-
Updated
Oct 27, 2020 - Go
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Is your feature request related to a problem? Please describe.
Users might want to fine tune the "offender" field in the report to a specific capture group in their regex.
Describe the solution you'd like
A clear and concise description of what you want to happen.
A config that supports reportGroup:
[[rules]]
description = "AWS Secret Key"
regex = '''(?i)aws(.{0,20})?(?-i
A static analysis security vulnerability scanner for Ruby on Rails applications
If you call fuzz on a layer that contains a PacketField, that fuzz does not recurse down into a PacketField within the layer
class Foo(Packet):
name='Foo'
fields_desc=[
int64("bar"),
]
def extract_padding(self, s):
return b'', s
class demo(Packet):
name="demo"
fields_desc = [ PacketField(name="foo",default=Foo(),cls=Foo)]
instDaemon to ban hosts that cause multiple authentication errors
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g. rake.gemspec has the information about rake.
To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
A curated list of awesome test automation frameworks, tools, libraries, and software for different programming languages. Sponsored by http://sdclabs.com
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Golang security checker
Infection Monkey - An automated pentest tool
My simple Swiss Army knife for http/https troubleshooting and profiling.
syzkaller is an unsupervised coverage-guided kernel fuzzer
Modlishka. Reverse Proxy.
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls listed here https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf and more than 100 additional checks that help on GDPR, HIPAA and other security requirements.
Describe the bug
In the docs found here:
https://bandit.readthedocs.io/en/latest/plugins/index.html#complete-test-plugin-listing
B109 and B111 show a description instead of a plugin name. This looks inconsistent since all the other plugin names are listed. I believe this is a result of a recent change to remove these deprecated plugins.
To Reproduce
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Next generation web scanner
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!][~][>]| {}If any of these characters appear in any of the tests, fail the CI. E
Source Code Security Audit (源代码安全审计)
Please select one:
ullaakut/cameradarPlease select one:
Add support for a DynamoDB storage backend. Although MySQL is available, it would require to run a RDS Instance for it. Extra costs, backup considerations, etc. Even with Aurora Serverless.
DynamoDB is just there, scales as needed with OnDemand pricing and has fine backup capabilities.
We plan to run step-ca in AWS ECS on Farga
Official Black Hat Arsenal Security Tools Repository
Linux privilege escalation auditing tool
大型内网渗透扫描器&Cobalt Strike,Ladon7.2内置94个模块,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、SMBGhost、Weblogic、ActiveMQ、Tomcat、Struts2系列,密码口令爆破(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、Netbios、LDAP、SmbHash、WmiHash、Winrm),远程执行命令(wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️
It would be nice if lynis would gather (and report in the portal/reports) information about user-accounts: