Skip to content
#

Security

Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.

Here are 2,270 public repositories matching this topic...

algo
RandomDSdevel
RandomDSdevel commented Sep 23, 2017

OS/Environment

None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)

Ansible version

None yet, as I haven't yet gotten that far into setting up Algo.

Version of components from requirements.txt

Not applicable (see above.)

Summary of the pro

jofpin
jofpin commented Jan 22, 2020

It has been a pleasure for me to contribute to all of you 2 versions of this tool.

I've been working on other open source projects that I'm about to release for you, so I haven't finished trape version 3.0.

But, I invite you and the entire community that has used this project, to collaborate with some lines of code, implementing your own ideas and improving trape, turning it into a project o

gpotter2
gpotter2 commented Dec 18, 2016

Hi & welcome to Scapy's github ! This page lists issues that you can try to fix if you want to start contributing to Scapy.

This list includes wishes and things added by the maintainers based on the issues that we get, but also issues marked with TODO or XXX that already exist in Scapy's code base (layers). If you want to contribute to the project you might just take care one of the bugs.

urh
jacobagilbert
jacobagilbert commented Sep 18, 2020

A common protocol structure is to have a header containing a length field, followed by data of length bytes, followed by additional protocol fields such as a CRC. If the length field is variable, the position of subsequent URH-specified protocol fields defined by fixed position will not be in the correct location.

I do not know the best way to address this, but quick and easy way to support

j4v
j4v commented Sep 23, 2020

Currently, facades implement good exception handling, but resource parsing does not. That means that for a given resource type, if parsing fails for any given resource, the fetch_all method fails and stops, hence not parsing any additional resources.

All resources should be reviewed and updated, to ensure they handle parsing errors.

e.g., for AWS IAM roles (https://github.com/nccgroup/Scou

Wikipedia
Wikipedia

Security apps

BackHub

Reliable GitHub repository backup, set up in minutes

Sonatype DepShield

Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen

Dependabot Preview

Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET

WhiteSource Bolt

Detect open source vulnerabilities in real time with suggested fixes for quick remediation

Renovate

Keep dependencies up-to-date with automated Pull Requests

GuardRails

GuardRails provides continuous security feedback for modern development teams

Snyk

Find, fix (and prevent!) known vulnerabilities in your code

LGTM

Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review

See more Security apps