scanning
Here are 295 public repositories matching this topic...
-
Updated
Oct 26, 2020 - C
-
Updated
Oct 1, 2020 - C
-
Updated
Oct 17, 2020 - Python
RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!][~][>]| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Oct 26, 2020 - Go
-
Updated
Oct 25, 2020 - PowerShell
-
Updated
Jul 6, 2020 - Python
-
Updated
Oct 25, 2020 - Python
-
Updated
Sep 30, 2020 - C#
-
Updated
Oct 24, 2020 - C++
Besides incoming blacklisted connections, external to internal traffic isn't super useful in any of our analysis modules. And incoming blacklisted connections is of questionable usefulness as well since the things that normally scan everything on the internet will also normally end up on blacklists. We're not trying to detect someone attacking coming in. We're trying to detect already compromised
-
Updated
Jan 23, 2018 - Shell
-
Updated
Jun 27, 2020 - Python
-
Updated
Aug 14, 2018 - Python
-
Updated
Oct 26, 2020 - Python
-
Updated
Oct 26, 2020 - XSLT
-
Updated
Oct 8, 2019 - Python
-
Updated
Jan 29, 2020 - Swift
-
Updated
Nov 15, 2019 - Java
-
Updated
Oct 25, 2020 - Python
-
Updated
Oct 2, 2020 - Python
-
Updated
Sep 3, 2020 - Go
-
Updated
Oct 26, 2020 - Python
-
Updated
Jan 25, 2016 - C#
-
Updated
Apr 25, 2018 - Python
Hi,
It would be interesting to have those new rules integrated in ChopChop, see : https://github.com/nnposter/nndefaccts/blob/master/http-default-accounts-fingerprints-nndefaccts.lua
Improve this page
Add a description, image, and links to the scanning topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the scanning topic, visit your repo's landing page and select "manage topics."


Is your feature request related to a problem? Please describe.
Users might want to fine tune the "offender" field in the report to a specific capture group in their regex.
Describe the solution you'd like
A clear and concise description of what you want to happen.
A config that supports
reportGroup: