-
Updated
Mar 8, 2022 - Python
Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 2,999 public repositories matching this topic...
-
Updated
Mar 7, 2022 - Python
-
Updated
Mar 6, 2022 - Python
-
Updated
Jan 15, 2022 - Python
-
Updated
Feb 19, 2022 - Python
-
Updated
Dec 8, 2021 - Python
-
Updated
Jan 20, 2022 - Python
-
Updated
Mar 8, 2022 - Python
Hi & welcome to Scapy's github ! This page lists issues that you can try to fix if you want to start contributing to Scapy.
This list includes wishes and things added by the maintainers based on the issues that we get, but also issues marked with TODO or XXX that already exist in Scapy's code base (layers). If you want to contribute to the project you might just take care one of the bugs.
-
Updated
Mar 7, 2022 - Python
It has been a pleasure for me to contribute to all of you 2 versions of this tool.
I've been working on other open source projects that I'm about to release for you, so I haven't finished trape version 3.0.
But, I invite you and the entire community that has used this project, to collaborate with some lines of code, implementing your own ideas and improving trape, turning it into a project o
-
Updated
Mar 3, 2022 - Python
-
Updated
Mar 8, 2022 - Python
Matched on: ::
Name: Internet Protocol (IP) Address Version 6
Link: https://www.shodan.io/host/::
This shouldn't match.
The generic Windows audit log config lacks many event ids, e.g.
- registry events
- driver load service addition events, System/7045 and Security/4697
- likely others
-
Updated
Mar 8, 2022 - Python
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
README translations
-
Updated
Mar 8, 2022 - Python
The https://github.com/nccgroup/ScoutSuite/blob/master/ScoutSuite/providers/gcp/rules/findings/iam-lack-of-service-account-key-rotation.json finding should only flag USER_MANAGED keys (https://cloud.google.com/iam/docs/reference/rest/v1/projects.serviceAccounts.keys), as SYSTEM_MANAGED keys are "managed and rotated by Google"
Describe the bug
In the docs found here:
https://bandit.readthedocs.io/en/latest/plugins/index.html#complete-test-plugin-listing
B109 and B111 show a description instead of a plugin name. This looks inconsistent since all the other plugin names are listed. I believe this is a result of a recent change to remove these deprecated plugins.
To Reproduce
- Navigate to https://bandit
-
Updated
Mar 6, 2022 - Python
-
Updated
Jan 13, 2022 - Python
This will help reduce some copy pasted boiler plate code.
Actual behaviour:
In case a custom app has print formats, the command bench uninstall-app (app) will fail with frappe.exceptions.LinkExistsError: Cannot delete or cancel because Module Def <a href="#Form/Module Def/ham">ham</a> is linked with Print Format <a href="#Form/Print Format/cheese">cheese</a>
Expected behaviour:
bench uninstall-app should also remove print formats that
-
Updated
Mar 8, 2022 - Python
- Wikipedia
- Wikipedia
GitHub Constellation India 2022
Mar 22 - 24, 2022 • Virtual
Security apps
GitProtect.io Backup
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
Semgrep
Code scanning at ludicrous speed. Find bugs and enforce code standards
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
Cloudback Backup
Backups your GitHub repository, code, LFS and metadata, on-demand and on-schedule
Rewind Backups for GitHub (Formerly BackHub)
Backup your GitHub repos & metadata automatically. Get daily backups that can be restored in seconds – AWS storage available
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Renovate
Keep dependencies up-to-date with automated Pull Requests
GuardRails
GuardRails provides continuous security feedback for modern development teams
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
A common protocol structure is to have a header containing a
lengthfield, followed by data oflengthbytes, followed by additional protocol fields such as a CRC. If the length field is variable, the position of subsequent URH-specified protocol fields defined by fixed position will not be in the correct location.I do not know the best way to address this, but quick and easy way to support