Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
-
Updated
Nov 12, 2020 - Go
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
A static analysis security vulnerability scanner for Ruby on Rails applications
If you call fuzz on a layer that contains a PacketField, that fuzz does not recurse down into a PacketField within the layer
class Foo(Packet):
name='Foo'
fields_desc=[
int64("bar"),
]
def extract_padding(self, s):
return b'', s
class demo(Packet):
name="demo"
fields_desc = [ PacketField(name="foo",default=Foo(),cls=Foo)]
instDaemon to ban hosts that cause multiple authentication errors
Unescaped characters in messages including < or > or " breaks XML format output required to convert to JUNIT format for Jenkins report collector.
Characters in messages and values properly escaped.
Error encountered in importing XML file by Jenkins XML parser.
Caused by: org.xml.sax.SAXParseException; l
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Infection Monkey - An automated pentest tool
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
A curated list of awesome test automation frameworks, tools, libraries, and software for different programming languages. Sponsored by http://sdclabs.com
Golang security checker
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
My simple Swiss Army knife for http/https troubleshooting and profiling.
syzkaller is an unsupervised coverage-guided kernel fuzzer
Modlishka. Reverse Proxy.
RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!][~][>]| {}If any of these characters appear in any of the tests, fail the CI. E
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls listed here https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf and more than 100 additional checks that help on GDPR, HIPAA and other security requirements.
Describe the bug
In the docs found here:
https://bandit.readthedocs.io/en/latest/plugins/index.html#complete-test-plugin-listing
B109 and B111 show a description instead of a plugin name. This looks inconsistent since all the other plugin names are listed. I believe this is a result of a recent change to remove these deprecated plugins.
To Reproduce
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Next generation web scanner
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Source Code Security Audit (源代码安全审计)
Please select one:
ullaakut/cameradarPlease select one:
Add support for a DynamoDB storage backend. Although MySQL is available, it would require to run a RDS Instance for it. Extra costs, backup considerations, etc. Even with Aurora Serverless.
DynamoDB is just there, scales as needed with OnDemand pricing and has fine backup capabilities.
We plan to run step-ca in AWS ECS on Farga
Official Black Hat Arsenal Security Tools Repository
Linux privilege escalation auditing tool
In urlscan.io Submit URLs to be scanned, search for historical results by IP, domain or URL, retrieve results and pivot to further leads. You can search all Public scans as well as your own Private scans on our platform. You can subscribe to our API plans as a Team and share your available quota amongst multiple users on the urlscan.io platform.
Use the search for historical results featur
大型内网渗透扫描器&Cobalt Strike,Ladon7.2内置94个模块,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、SMBGhost、Weblogic、ActiveMQ、Tomcat、Struts2系列,密码口令爆破(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、Netbios、LDAP、SmbHash、WmiHash、Winrm),远程执行命令(wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️
Is your feature request related to a problem? Please describe.
During the analysis of big repositories where the important feature is to detect the secrets at the HEAD, it's important to be able to use the
git clone --depthin order to reduce the size of the repository that needs to be downloaded.Describe the solution you'd like
gitleaksalready have an--depthoption, if `gitl