doyensec / imagemagick-security-policy-evaluatorLinks
The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a wide set of malicious attacks. It assists with the process of reviewing such policies, which is usually a manual task, and helps identify the best practices for ImageMagick deployments.
☆17Updated 2 years ago
Alternatives and similar repositories for imagemagick-security-policy-evaluator
Users that are interested in imagemagick-security-policy-evaluator are comparing it to the libraries listed below
Sorting:
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 5 months ago
- ZAP Management Scripts☆23Updated this week
- ☆21Updated 7 years ago
- A curated threat modeling library collection☆23Updated last year
- A static website template for security pages.☆52Updated 3 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- ☆18Updated 5 years ago
- ☆14Updated 4 months ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 5 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆92Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- ☆10Updated 3 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 7 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Updated 4 years ago
- Dependency Combobulator☆93Updated last year
- OWASP Threat Dragon with Gitlab Integration☆27Updated 8 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Global Security Database Tools☆43Updated last year
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆65Updated 2 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated last year
- A list of user agents belonging to common web scanners.☆40Updated 3 years ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.☆111Updated 10 months ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- 🐐 Intrusion Detection System☆17Updated 2 years ago