threat
Here are 88 public repositories matching this topic...
-
Updated
Feb 10, 2018 - Python
Most .py files use #!/usr/bin/python3 as shebang, but few others use #!/usr/bin/env python3.
Files which use #!/usr/bin/env python3:
./contrib/eventdb/common.py
./intelmq/bin/intelmq_generate_misp_objects_templates.py
./intelmq/tests/bots/parsers/github_feed/test_parser.py
These files should use #!/usr/bin/python3 for the sake of consistency.
-
Updated
Sep 7, 2020 - PowerShell
"AA03": { "description": "Weakness in SSO Authorization", "source": (Process, Element), "target": (Process, Server), "condition": "target.implementsAuthenticationScheme is False", },
What if the Process implements BasicAuth or uses mutual TLS (neither of which is SSO)?
If the Process uses SAML or OAuth, then maybe.
Maybe authenticationScheme as a string var is neces
-
Updated
Aug 14, 2020 - Python
-
Updated
Oct 12, 2020 - Java
-
Updated
Sep 14, 2020 - Java
-
Updated
Jun 22, 2020
-
Updated
Oct 7, 2020 - TSQL
-
Updated
Nov 4, 2019 - Lua
-
Updated
Mar 8, 2019 - Python
-
Updated
Feb 21, 2020 - Python
-
Updated
May 28, 2020 - TypeScript
-
Updated
Sep 14, 2018
-
Updated
Aug 10, 2018 - Ruby
-
Updated
Feb 16, 2017 - Python
-
Updated
Apr 29, 2019 - Go
-
Updated
Nov 26, 2019 - Shell
Improve this page
Add a description, image, and links to the threat topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the threat topic, visit your repo's landing page and select "manage topics."
Besides incoming blacklisted connections, external to internal traffic isn't super useful in any of our analysis modules. And incoming blacklisted connections is of questionable usefulness as well since the things that normally scan everything on the internet will also normally end up on blacklists. We're not trying to detect someone attacking coming in. We're trying to detect already compromised