doyensec / imagemagick-security-policy-evaluator
The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a wide set of malicious attacks. It assists with the process of reviewing such policies, which is usually a manual task, and helps identify the best practices for ImageMagick deployments.
☆14Updated 2 years ago
Alternatives and similar repositories for imagemagick-security-policy-evaluator:
Users that are interested in imagemagick-security-policy-evaluator are comparing it to the libraries listed below
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 9 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 8 years ago
- A static website template for security pages.☆50Updated 7 months ago
- 🦊A cloudflare DNS over HTTPs resolver client library.☆12Updated 2 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated last month
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- ☆11Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- ☆12Updated 2 years ago
- A Python package to download Zone Files from the Centralized Zone Data Service hosted by ICAAN.☆17Updated last year
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- TSLint rules for Angular☆18Updated 6 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- THOR APT Scanner User Manual☆18Updated this week
- A Go client for crobat☆24Updated 5 years ago
- Secure Boot Definition Languag☆10Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated 3 weeks ago
- ☆14Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- A Burp Suite extension which performs checks for cross-domain scripting against the DOM, subresource integrity checks, and evaluates Java…☆9Updated 3 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- ☆12Updated 4 months ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Updated 4 years ago