Skip to content
#

security-tools

Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.

Here are 1,565 public repositories matching this topic...

d4t4king
d4t4king commented May 1, 2020

Describe the bug
Online docs for NETW-3200 are not yet implemented.

Version

  • Distribution: Ubuntu 18.04
  • Lynis version: 3.0.0

Expected behavior
A (minimal) description of the problem should exist and ideally a general direction on how to fix the issue.

Output

A new discovery!

Oops, looks like this control is not listed yet in the database.

Want to help 
gitleaks
Incisive
Incisive commented May 10, 2019

Thanks for this great tool!

Hoping to get some clarification here surrounding commits. I've setup automation around Gitleaks to scan commits as they happen on a few repositories, however, the tool is alerting when the secret is first committed, and then alerting a second time when it's removed (not a file deletion, but a line removal).

Is there any configuration options to disable alerts w

gpotter2
gpotter2 commented Jul 21, 2019

Project "Hinty" aims at adding Type hints to Scapy. It will help discover bugs, improve the API, and make Scapy up-to-date with the high standards of Python libraries.

Implementation

We use mypy to ensure automatic testing of the work that has already been completed. PRs that fall under project Hinty will process one (or a few) files and register them into the checks. The file

computeralex92
computeralex92 commented Dec 29, 2019

In a server / client setup it would be great if Trivy would expose some metrics about the scans happen with the central server.
Some useful metrics for my implementation:

  • Last DB Update (timestamp)
  • Last DB Update Attempt (timestamp)
  • Sum of Issues found
  • Sum of Issues found splited up in SEVERITY
  • Sum of Issues found splited up in sources (OS, Python, Node etc)

As Trivy is build to

nchelluri
nchelluri commented Sep 12, 2019

Summary

(I tested this for G201 but inspected the code for G202 and believe it has the same issue.)

G201 will detect SQL string formatting when I have fmt.Sprintf("SELECT * FROM TEST UNION %s", "SELECT * FROM test") in my code. However, it will not detect when I have fmt.Sprintf("select * from test union %s", "select * from test") in my code. I believe this is a bug.

See: https://g

monkey
VakarisZ
VakarisZ commented Mar 30, 2020

Exploiter selector should have these additional features:

  • Filter by type. There should be keywords/buttons like "brute force", "vulnerability", "unsafe", "all" that would enable/disable corresponding exploiters.
  • Exploiter description. Upon clicking on exploiter user should see a short description of with with CVE if it has one.

This feature should be an extension of [list selection reac

bittner
bittner commented Apr 22, 2020

There are several issues open that suggest that it is unclear how Bandit is meant to be executed. In fact, there are no usage instructions at all in the Bandit docs.

Describe the solution you'd like

There should be simple, crisp, usage instructions in the Bandit docs, e.g.

Install Bandit:

pip install bandit

Run Bandit o

cobra-reporter
cobra-reporter commented Dec 21, 2017

Environment

Cobra version: 2.0.0-alpha.5
Python version: 2.7.10
Operating system: Darwin-15.5.0-x86_64-i386-64bit
Command line: cobra.py -t tests/vulnerabilities/ -r CVI-167001.xml

Traceback

Traceback (most recent call last):
  File "/Users/Viarus/Documents/cobra/cobra/__init__.py", line 82, in main
    cli.start(args.target, args.format, args.output, args.special_rules, a_sid)
 
certificates
hongkongkiwi
hongkongkiwi commented Nov 29, 2019

What would you like to be added

I would love to have a MongoDB database connector.

Why this is needed

All our other services use MongoDB and I would love to keep everything unified in one database system.

Failing that, is it possible to provide a pluggable webhook that we can have and then enter into our own database?

大型内网渗透扫描器&Cobalt Strike,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、Weblogic、ActiveMQ、Tomcat、Struts2系列等,密码口令爆破含(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、LDAP、SmbHash、WmiHash)等,可高度自定义插件支持.NET程序集、DLL(C#/Delphi/VC)、PowerShell等语言编写的插件,支持通过配置INI批量调用任意外部程序或命令,EXP生成器一键生成Web漏洞POC,可快速扩展扫描或利用能力。支持Cobalt Strike 3.X-4.0

  • Updated May 3, 2020
  • C#

A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.

  • Updated Apr 9, 2020
  • Python
You can’t perform that action at this time.