doyensec / imagemagick-security-policy-evaluator
The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a wide set of malicious attacks. It assists with the process of reviewing such policies, which is usually a manual task, and helps identify the best practices for ImageMagick deployments.
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for imagemagick-security-policy-evaluator
- Secure Boot Definition Languag☆10Updated 2 years ago
- A static website template for security pages.☆50Updated 2 months ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 8 months ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 9 months ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- A list of user agents belonging to common web scanners.☆38Updated 2 years ago
- 🦊A cloudflare DNS over HTTPs resolver client library.☆13Updated last year
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 9 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 7 years ago
- Blue Team Powershell Script☆18Updated 2 years ago
- Javascript deobfuscation tool☆16Updated 6 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last year
- ☆14Updated last year
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- ☆11Updated 8 years ago
- A Go client for crobat☆23Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 3 years ago
- NinjaDVA is not just another Damn Vulnerable Application☆14Updated 4 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago