doyensec / imagemagick-security-policy-evaluatorLinks
The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a wide set of malicious attacks. It assists with the process of reviewing such policies, which is usually a manual task, and helps identify the best practices for ImageMagick deployments.
☆17Updated 2 years ago
Alternatives and similar repositories for imagemagick-security-policy-evaluator
Users that are interested in imagemagick-security-policy-evaluator are comparing it to the libraries listed below
Sorting:
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- ☆12Updated last month
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- ☆18Updated 5 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 5 months ago
- ☆58Updated 2 years ago
- ZAP Management Scripts☆23Updated 2 weeks ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆77Updated 3 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 2 years ago
- A static website template for security pages.☆52Updated 3 weeks ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆55Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated last month
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 2 months ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22Updated last year
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago