-
Updated
Jul 30, 2021 - Go
#
zap
Here are 206 public repositories matching this topic...
Blazing fast, structured, leveled logging in Go.
Open
Apache部署GVA项目
chenweil
commented
Apr 21, 2021
Apache 部署GVA
部署版本
GVA 2.4.0
具体配置
VirtualHost 配置中加入:
<Proxy /api>
Order deny,allow
Allow from all
</Proxy>
ProxyPass /api http://127.0.0.1:8888
ProxyPassReverse /api http://127.0.0.1:8888此配置目的与 官方 nginx 提供配置类似。
注意
Apache 需要开启 proxy_module
http://127.0.0.1:8888 为后端默认地址,如已更改记得替换
基于 Gin 进行模块化设计的 API 框架,封装了常用功能,使用简单,致力于进行快速的业务研发。比如,支持 cors 跨域、jwt 签名验证、zap 日志收集、panic 异常捕获、trace 链路追踪、prometheus 监控指标、swagger 文档生成、viper 配置文件解析、gorm 数据库组件、gormgen 代码生成工具、graphql 查询语言、errno 统一定义错误码、gRPC 的使用 等等。
-
Updated
Jul 18, 2021 - Go
OWASP ZAP Add-ons
-
Updated
Aug 1, 2021 - Java
DevSecOps Distribution - Virtual Environment to learn DevSecOps
zap
brakeman
bandit
certification-prep
practical-traning
practical-devsecops
devsecops-studio
learn-devsecops
os-hardening
-
Updated
Apr 20, 2021 - Python
A free CDN for developers.
javascript
css
acceleration
cdn
sponsors
zap
optimization
images
image-processing
compress-images
minification
-
Updated
Apr 17, 2021 - JavaScript
psiinon
commented
May 22, 2020
If HTTP sites (is not HTTPS ones) use the Access-Control-Allow-Origin header then the site will typically not work.
ZAP should automatically fix this header.
https://stackoverflow.com/questions/61940616/how-do-i-work-with-http-sites-using-the-hud-in-owasps-zap-proxy
A simple tool for interacting with OWASP ZAP from the commandline.
-
Updated
Oct 28, 2019 - Python
Rescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
-
Updated
Mar 2, 2021 - Go
[https://www.sofineday.com], golang项目开发脚手架,集成最佳实践(gin+gorm+go-redis+mongo+cors+jwt+json日志库zap(支持日志收集到kafka或mongo)+消息队列kafka+微信支付宝支付gopay+api加密+api反向代理+go modules依赖管理+headless爬虫chromedp+makefile+二进制压缩+livereload热加载)
redis
golang
cors
mongo
jwt
kafka
spider
zap
makefile
headless
livereload
api-server
alipay
compress
gorm
reverseproxy
wxpay
gin-framework
gomodule
-
Updated
May 31, 2021 - Go
基于 Echo + Gorm + Casbin + Uber-FX 实现的 RBAC 权限管理脚手架,致力于提供一套尽可能轻量且优雅的中后台解决方案。
-
Updated
May 19, 2021 - Go
Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website
-
Updated
Apr 29, 2020 - Java
This project is created to demonstrate Go-Lang Clean Architecture/DDD/Hexagonal Architecture, and It show the usage of popular libraries gin, gorm, zap and dig.
go
golang
zap
clean-architecture
gorm
hexagonal-architecture
gin-gonic
ddd-architecture
ddd-sample
dig
-
Updated
Apr 20, 2019 - Go
Repository for all the workshop content delivered at nullcon X on 1st of March 2019
-
Updated
Apr 4, 2019 - CSS
Integrates OWASP Zed Attack Proxy reports into SonarQube
-
Updated
Jul 7, 2021 - HTML
go封装的日志 logrus zap,并且增加了opentracing分布式日志追踪,日志格式化成json,日志大小切割
-
Updated
Jun 11, 2021 - Go
Zap baseline scanner in Docker with authentication
-
Updated
Jul 20, 2021 - Python
step by step to build web application via fasthttp
-
Updated
Feb 20, 2020 - Go
Want to test your applications using the latest OWASP security toolchains and the NIST National Vulnerability Database using Jenkins, Ansible and docker? 🐳 🛡️ 🔒
react
python
c-sharp
docker
jenkins
security
ansible
django
node
vue
zap
tensorflow
owasp
security-vulnerability
ruby-on-rails
nvd
security-automation
security-testing
dependency-checker
national-vulnerability-database
-
Updated
Nov 2, 2018 - Shell
OWASP Zed Attack Proxy project landing page.
-
Updated
Jul 5, 2021 - HTML
Improve this page
Add a description, image, and links to the zap topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the zap topic, visit your repo's landing page and select "manage topics."
Hi,
I am getting some XSS Reflected and persistent alerts generated when a .xls or .pdf file contains unsantised XSS injection strings. I do not want to add an alert filter because it is an .asp page that generates these files and so there could be another XSS vulnerability on the page.
I was wondering if the XSS rule could check the Content-Type header and the file identifying line (first