Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 2,061 public repositories matching this topic...
-
Updated
Oct 22, 2020 - Python
-
Updated
Sep 15, 2020 - Python
-
Updated
Oct 20, 2020 - Python
-
Updated
Oct 22, 2020 - Python
-
Updated
Aug 16, 2020 - Python
-
Updated
Jun 28, 2020 - Python
-
Updated
Oct 6, 2020 - Python
If you call fuzz on a layer that contains a PacketField, that fuzz does not recurse down into a PacketField within the layer
class Foo(Packet):
name='Foo'
fields_desc=[
int64("bar"),
]
def extract_padding(self, s):
return b'', s
class demo(Packet):
name="demo"
fields_desc = [ PacketField(name="foo",default=Foo(),cls=Foo)]
inst-
Updated
Oct 20, 2020 - Python
-
Updated
Jun 4, 2020 - Python
A common protocol structure is to have a header containing a length field, followed by data of length bytes, followed by additional protocol fields such as a CRC. If the length field is variable, the position of subsequent URH-specified protocol fields defined by fixed position will not be in the correct location.
I do not know the best way to address this, but quick and easy way to support
It has been a pleasure for me to contribute to all of you 2 versions of this tool.
I've been working on other open source projects that I'm about to release for you, so I haven't finished trape version 3.0.
But, I invite you and the entire community that has used this project, to collaborate with some lines of code, implementing your own ideas and improving trape, turning it into a project o
-
Updated
Oct 12, 2020 - Python
-
Updated
Oct 20, 2020 - Python
-
Updated
Oct 22, 2020 - Python
We need Vagrant docs, you can find it here https://github.com/NullArray/AutoSploit/tree/dev-beta/Vagrant
README translations
-
Updated
Oct 16, 2020 - Python
-
Updated
Oct 22, 2020 - Python
-
Updated
Oct 6, 2020 - Python
-
Updated
Oct 22, 2020 - Python
Like in #1675 we should review all the dependencies to see if we can pin exactly what dependencies we want. Something like pip freeze.
The generic Windows audit log config lacks many event ids, e.g.
- registry events
- driver load service addition events, System/7045 and Security/4697
- likely others
-
Updated
Jan 29, 2020 - Python
Describe the bug
In the docs found here:
https://bandit.readthedocs.io/en/latest/plugins/index.html#complete-test-plugin-listing
B109 and B111 show a description instead of a plugin name. This looks inconsistent since all the other plugin names are listed. I believe this is a result of a recent change to remove these deprecated plugins.
To Reproduce
- Navigate to https://bandit
-
Updated
Sep 16, 2020 - Python
Currently, facades implement good exception handling, but resource parsing does not. That means that for a given resource type, if parsing fails for any given resource, the fetch_all method fails and stops, hence not parsing any additional resources.
All resources should be reviewed and updated, to ensure they handle parsing errors.
e.g., for AWS IAM roles (https://github.com/nccgroup/Scou
- Wikipedia
- Wikipedia
Security apps
Dependabot Preview
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
GuardRails
GuardRails provides continuous security feedback for modern development teams
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Renovate
Keep dependencies up-to-date with automated Pull Requests
BackHub
Reliable GitHub repository backup, set up in minutes
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen


OS/Environment
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
Ansible version
None yet, as I haven't yet gotten that far into setting up Algo.
Version of components from
requirements.txtNot applicable (see above.)
Summary of the pro