This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
training
exploit
hackers
hacking
cybersecurity
penetration-testing
exploits
vulnerability
awesome-list
video-course
hacker
vulnerability-management
vulnerability-identification
vulnerability-scanners
vulnerability-assessment
ethical-hacking
awesome-lists
exploit-development
ethicalhacking
hacking-series
-
Updated
Jun 9, 2021 - Python
Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g.
rake.gemspec
has the information aboutrake
.To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*