-
Updated
Jul 15, 2021 - Shell
security-tools
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 2,192 public repositories matching this topic...
-
Updated
Jul 16, 2021 - Go
-
Updated
Jul 14, 2021 - JavaScript
Gitleaks is missing quite a few rules for the Microsoft ecosystem, including Visual Studio, Azure and Azure DevOps.
Microsoft used to have a competing product called credscan
, but it was recently deprecated in favor of the GitHub Security offerings.
I've ported most of the rules from credscan to the gitleaks format and put them in a repo here:
https://github.com/jessehouwing/gitleaks-azur
Hi & welcome to Scapy's github ! This page lists issues that you can try to fix if you want to start contributing to Scapy.
This list includes wishes and things added by the maintainers based on the issues that we get, but also issues marked with TODO
or XXX
that already exist in Scapy's code base (layers). If you want to contribute to the project you might just take care one of the bugs.
-
Updated
Jul 16, 2021 - Python
-
Updated
Jul 15, 2021 - Ruby
-
Updated
May 27, 2021 - Shell
-
Updated
Jul 16, 2021 - Python
-
Updated
Jul 13, 2021 - Go
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
README translations
RustScan has an accessible mode, rustscan --accessible
which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible
a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!]
[~]
[>]
| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Jul 9, 2021 - C#
-
Updated
Jul 16, 2021 - Shell
-
Updated
Jul 16, 2021 - Go
-
Updated
Feb 10, 2021 - Shell
-
Updated
Jul 14, 2021 - Go
Describe the bug
In the docs found here:
https://bandit.readthedocs.io/en/latest/plugins/index.html#complete-test-plugin-listing
B109 and B111 show a description instead of a plugin name. This looks inconsistent since all the other plugin names are listed. I believe this is a result of a recent change to remove these deprecated plugins.
To Reproduce
- Navigate to https://bandit
-
Updated
Jul 2, 2021 - Go
-
Updated
Jul 8, 2021
hashicorp/vault#8690
Original Vault Issue Comment: hashicorp/vault#8690 (comment)
Old Issue that tracked the completion of the RA API which enables a plugin like architecture for new backends: smallstep/certificates#343
-
Updated
Jun 30, 2021 - Ruby
-
Updated
Jun 10, 2021 - Python
-
Updated
Jul 15, 2021 - Python
-
Updated
Jun 17, 2021 - Shell
-
Updated
Jun 30, 2021 - Python
Is there a way to skip the nmap scan and go straight to the attacking routes? In case i already know the target list is full of open rtsp port IPs.
-
Updated
Jul 15, 2021 - C#
-
Updated
Jul 16, 2021 - Python
- Wikipedia
- Wikipedia
Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g.
rake.gemspec
has the information aboutrake
.To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*