-
Updated
Oct 23, 2020 - Go
security-tools
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 1,828 public repositories matching this topic...
Is your feature request related to a problem? Please describe.
Users might want to fine tune the "offender" field in the report to a specific capture group in their regex.
Describe the solution you'd like
A clear and concise description of what you want to happen.
A config that supports reportGroup
:
[[rules]]
description = "AWS Secret Key"
regex = '''(?i)aws(.{0,20})?(?-i
-
Updated
Oct 23, 2020 - Ruby
If you call fuzz on a layer that contains a PacketField, that fuzz does not recurse down into a PacketField within the layer
class Foo(Packet):
name='Foo'
fields_desc=[
int64("bar"),
]
def extract_padding(self, s):
return b'', s
class demo(Packet):
name="demo"
fields_desc = [ PacketField(name="foo",default=Foo(),cls=Foo)]
inst
-
Updated
Oct 20, 2020 - Python
-
Updated
Sep 23, 2020 - Shell
Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g. rake.gemspec
has the information about rake
.
To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
README translations
-
Updated
Oct 16, 2020
-
Updated
Oct 18, 2020 - C#
-
Updated
Oct 7, 2020 - Go
-
Updated
Oct 23, 2020 - Python
-
Updated
Oct 18, 2020 - Shell
-
Updated
Oct 24, 2020 - Go
-
Updated
Jun 28, 2020 - Go
-
Updated
Oct 21, 2020 - Shell
Describe the bug
In the docs found here:
https://bandit.readthedocs.io/en/latest/plugins/index.html#complete-test-plugin-listing
B109 and B111 show a description instead of a plugin name. This looks inconsistent since all the other plugin names are listed. I believe this is a result of a recent change to remove these deprecated plugins.
To Reproduce
- Navigate to https://bandit
-
Updated
Oct 17, 2020 - Python
-
Updated
Oct 6, 2020 - Ruby
-
Updated
Sep 6, 2020
RustScan has an accessible mode, rustscan --accessible
which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible
a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!]
[~]
[>]
| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Apr 24, 2020 - Python
Would be awesome if it would be possible to save the found streams to a M3U file, compatible with VLC. An example template of a valid M3U file is the following:
#EXTM3U
#EXTINF:-1 tvg-id="" tvg-name="" tvg-language="" tvg-logo="" tvg-country="" tvg-url="" group-title="",[IP AND CHANNELID HERE FOR NAME]
rtsp://192.168.0.5/route/to/stream/here
#EXTINF:-1 tvg-id="" tvg-name="" tvg-langua
What would you like to be added
Add support for a DynamoDB storage backend. Although MySQL is available, it would require to run a RDS Instance for it. Extra costs, backup considerations, etc. Even with Aurora Serverless.
DynamoDB is just there, scales as needed with OnDemand pricing and has fine backup capabilities.
Why this is needed
We plan to run step-ca in AWS ECS on Farga
-
Updated
Oct 2, 2020
-
Updated
Oct 2, 2020 - Shell
-
Updated
Sep 15, 2020 - C#
-
Updated
Sep 13, 2020 - JavaScript
-
Updated
Aug 7, 2020
- Wikipedia
- Wikipedia
It would be nice if lynis would gather (and report in the portal/reports) information about user-accounts: