-
Updated
Jul 3, 2020 - Go
vulnerability-assessment
Here are 77 public repositories matching this topic...
-
Updated
Jul 3, 2020 - Python
-
Updated
Jan 29, 2020 - Python
-
Updated
Mar 5, 2020 - Python
-
Updated
May 22, 2020 - Lua
-
Updated
Jun 25, 2020 - HTML
(This old idea popped up to my mind while discussing #219.)
To be both consistent and more intuitive, etc/plugins.txt should be rename etc/plugins.ini.
*.ini or *.conf carry a meaning, whereas *.txt is not. Since the base of cve-search uses *.ini , let's stick to that. Python configparser documentation also refer to "INI fi
Merge /Testing_for_Vertical_Bypassing_Authorization_Schema_WSTG-AUTHZ-00X.md into 4-Web_Application_Security_Testing/05-Authorization_Testing/03-Testing_for_Privilege_Escalation.md
-
Updated
Dec 24, 2019
-
Updated
Jun 12, 2020 - Python
-
Updated
Jul 2, 2020 - Perl
-
Updated
Jul 3, 2020 - C
-
Updated
Jul 1, 2020 - Java
-
Updated
Mar 18, 2020 - Python
-
Updated
Apr 22, 2018 - Python
-
Updated
Apr 20, 2020 - Python
-
Updated
Jul 1, 2020 - Ruby
-
Updated
Jul 18, 2018 - Python
show how many commands ran
show pretty pictures on how many hosts/ports/paths are in the db
show the actual db output for ports/paths/hosts/etc
-
Updated
Aug 20, 2019 - Python
-
Updated
Oct 18, 2018 - Go
Build an npm scanner
Extracting installed npms should be relatively simple, and then they can be checked for vulnerabilities.
package.json is the obvious starting point,
npm list -g --depth=0 is the canonical way to get the view from a command line, but also subdirs of node_modules should work.
We'd have to figure out how to identify vulnerable ones, but there is a fairly large ecosystem for that as well.
-
Updated
Jul 3, 2020 - JavaScript
-
Updated
Jun 24, 2020 - Python
-
Updated
Jun 24, 2020 - TypeScript
-
Updated
Sep 29, 2017 - Lua
-
Updated
Jun 28, 2020 - Vue
-
Updated
Feb 7, 2020 - PowerShell
Improve this page
Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."
It would be nice if lynis would gather (and report in the portal/reports) information about user-accounts: