The Wayback Machine - https://web.archive.org/web/20201105044554/https://github.com/topics/security-tools
Skip to content
#

security-tools

Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.

Here are 1,832 public repositories matching this topic...

gitleaks
jonny-wg2
jonny-wg2 commented Jun 15, 2020

Is your feature request related to a problem? Please describe.
I would like to be able to whitelist a commit within the rule. Furthermore, I would like the ability to have multiple whitelists for commits so I can add more descriptive tags from which repo the commit lives etc.

Describe the solution you'd like

[[rules]]
	description = "AWS Secret Key"
	regex = '''(?i)aws(.{0,20}
sarcasticmonkeys
sarcasticmonkeys commented Sep 8, 2020

If you call fuzz on a layer that contains a PacketField, that fuzz does not recurse down into a PacketField within the layer

class Foo(Packet):
    name='Foo'
    fields_desc=[
        int64("bar"),
    ]
    def extract_padding(self, s):
        return b'', s
        
class demo(Packet):
    name="demo"
    fields_desc = [ PacketField(name="foo",default=Foo(),cls=Foo)]
inst
phr0zenx
phr0zenx commented Oct 30, 2020

Description

Unescaped characters in messages including < or > or " breaks XML format output required to convert to JUNIT format for Jenkins report collector.

What did you expect to happen?

Characters in messages and values properly escaped.

What happened instead?

Error encountered in importing XML file by Jenkins XML parser.

Caused by: org.xml.sax.SAXParseException; l

Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls listed here https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf and more than 100 additional checks that help on GDPR, HIPAA and other security requirements.

  • Updated Nov 4, 2020
  • Shell
RustScan
bee-san
bee-san commented Oct 18, 2020

RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.

Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:

  1. [!]
  2. [~]
  3. [>]
  4. | {}

If any of these characters appear in any of the tests, fail the CI. E

certificates
EmiiKhaos
EmiiKhaos commented Jul 16, 2020

What would you like to be added

Add support for a DynamoDB storage backend. Although MySQL is available, it would require to run a RDS Instance for it. Extra costs, backup considerations, etc. Even with Aurora Serverless.

DynamoDB is just there, scales as needed with OnDemand pricing and has fine backup capabilities.

Why this is needed

We plan to run step-ca in AWS ECS on Farga

大型内网渗透扫描器&Cobalt Strike,Ladon7.2内置94个模块,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、SMBGhost、Weblogic、ActiveMQ、Tomcat、Struts2系列,密码口令爆破(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、Netbios、LDAP、SmbHash、WmiHash、Winrm),远程执行命令(wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0

  • Updated Nov 4, 2020
  • C#
Wikipedia
Wikipedia
You can’t perform that action at this time.