doyensec / imagemagick-security-policy-evaluatorLinks
The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a wide set of malicious attacks. It assists with the process of reviewing such policies, which is usually a manual task, and helps identify the best practices for ImageMagick deployments.
☆17Updated 2 years ago
Alternatives and similar repositories for imagemagick-security-policy-evaluator
Users that are interested in imagemagick-security-policy-evaluator are comparing it to the libraries listed below
Sorting:
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 3 months ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- A curated threat modeling library collection☆22Updated last year
- OWASP Threat Dragon with Gitlab Integration☆27Updated 7 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆105Updated 6 years ago
- A static website template for security pages.☆52Updated last month
- ☆12Updated 2 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 6 months ago
- ☆10Updated 3 years ago
- ZAP Management Scripts☆23Updated last week
- ☆21Updated 6 years ago
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 4 months ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- InfoSec OpenAI Examples☆19Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆74Updated last year
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago