Skip to content

Commit 8f9651e

Browse files
committed
Readme Overhall
1 parent df50c7b commit 8f9651e

File tree

61 files changed

+278
-300
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+278
-300
lines changed

acunetix/README.md

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
-Acunetix-
2+
3+
Acunetix is a global web security leader. As the first company to build a fully dedicated and fully automated web vulnerability scanner, Acunetix carries unparalleled experience in the field. The Acunetix web vulnerability scanner has been recognized as a leading solution multiple times. It is also trusted by customers from the most demanding sectors including many fortune 500 companies.
4+
5+
Website: https://www.acunetix.com/

anchore_engine/README.md

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
-Anchore Engine-
2+
3+
The Anchore Engine is an open source project that provides a centralized service for performing detailed analysis on container images, running queries, producing reports and defining policies that can be used in CI/CD pipelines.
4+
5+
Website: https://anchore.com/engine/
6+
Github: https://github.com/anchore/anchore-engine

appscan/README.md

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
-AppScan-
2+
3+
IBM AppScan solutions provide preemptive protection for mobile, web and cloud applications. They secure apps against malicious use today and help you remediate potential attacks in the future.
4+
5+
Website: https://www.ibm.com/security/application-security/appscan

appspider/README.md

+3-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,5 @@
1-
# Sample Scan Files
1+
-AppSpider-
22

3-
Repository for sample scan files.
3+
Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://www.rapid7.com/products/appspider/

arachni/README.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
1-
# Sample Scan Files
1+
-Arachni-
22

3-
Repository for sample scan files.
3+
Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of modern web applications.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://www.arachni-scanner.com/
6+
Github: https://github.com/Arachni/arachni

aws_prowler/README.md

+7
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
-AWS Prowler-
2+
3+
Prowler is a command line tool for AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool.
4+
It follows guidelines of the CIS Amazon Web Services Foundations Benchmark (49 checks) and has 40 additional checks including related to GDPR and HIPAA.
5+
6+
Website: https://blog.savagesec.com/securing-your-aws-infrastructure-using-prowler-ec6e6b97513
7+
Github: https://github.com/toniblyx/prowler

aws_scout2/README.md

+2-10
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,3 @@
1-
# Sample Scan Files
1+
AWS Scout2 is no longer under development. The latest (and final) version of Scout2 can be found in https://github.com/nccgroup/Scout2/releases and https://pypi.org/project/AWSScout2.
22

3-
Repository for sample scan files.
4-
5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
3+
The project has migrated to https://github.com/nccgroup/ScoutSuite.

bandit/README.md

+3-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,5 @@
1-
# Sample Scan Files
1+
-Bandit-
22

3-
Repository for sample scan files.
3+
Bandit is a tool designed to find common security issues in Python code.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Github: https://github.com/PyCQA/bandit

blackduck/README.md

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
-Blackduck-
2+
3+
For over 15 years, security, development, and legal teams around the globe have relied on Black Duck to help them manage the risks that come with the use of open source.Built on the Black Duck KnowledgeBase™—the most comprehensive database of open source component, vulnerability, and license information—Black Duck software composition analysis solutions and open source audits give you the insight you need to track the open source in your code, mitigate security and license compliance risks, and automatically enforce open source policies using your existing DevOps tools and processes.
4+
5+
Website: https://www.blackducksoftware.com/

brakeman/README.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
1-
# Sample Scan Files
1+
-Brakeman-
22

3-
Repository for sample scan files.
3+
Brakeman is a free vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at any stage of development.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://brakemanscanner.org/
6+
Github: https://github.com/presidentbeef/brakeman

bundler_audit/README.md

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
-Bundler Audit-
2+
3+
bundler-audit provides patch-level verification for Bundled apps.
4+
5+
Website: bundler-audit provides patch-level verification for Bundled apps.
6+
Github: https://github.com/rubysec/bundler-audit

burp/README.md

+3-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,5 @@
1-
# Sample Scan Files
1+
-Burp-
22

3-
Repository for sample scan files.
3+
Burp includes coverage of over 100 generic vulnerabilities, such as SQL injection and cross-site scripting (XSS), with great performance against all vulnerabilities in the OWASP top 10.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://portswigger.net/burp

checkmarx/README.md

+3-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,5 @@
1-
# Sample Scan Files
1+
-Checkmarx-
22

3-
Repository for sample scan files.
3+
Taking a holistic, platform-centric approach, the Software Exposure Platform builds security in from the start of the SDLC, continuously supporting all stages of the DevOps cycle.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://www.checkmarx.com

clair/README.md

+6-2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1-
# Clair scan
1+
-Clair-
22

3-
Sample scan from vulnerables/web-dvwa (see also: https://hub.docker.com/r/vulnerables/web-dvwa/) with the client `clair-scanner`.
3+
Clair is an open source project for the static analysis of vulnerabilities in appc and docker containers.
4+
Vulnerability data is continuously imported from a known set of sources and correlated with the indexed contents of container images in order to produce lists of vulnerabilities that threaten a container. When vulnerability data changes upstream, the previous state and new state of the vulnerability along with the images they affect can be sent via webhook to a configured endpoint. All major components can be customized programmatically at compile-time without forking the project.
5+
6+
Website: https://coreos.com/clair/docs/latest/
7+
Github: https://github.com/coreos/clair

clair_klar/README.md

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
-Clair Klar-
2+
3+
Klar is a simple tool to analyze images stored in a private or public Docker registry for security vulnerabilities using Clair https://github.com/coreos/clair. Klar is designed to be used as an integration tool so it relies on enviroment variables. It's a single binary which requires no dependencies.
4+
5+
Github: https://github.com/optiopay/klar

cobalt/README.md

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
-Cobalt-
2+
3+
Cobalt is redefining the modern pentest for companies who want serious hacker-like testing built into their development cycle.
4+
5+
Website: https://cobalt.io/

contrast/README.md

+6-8
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
1-
# Sample Scan Files
1+
-Contrast-
22

3-
Repository for sample scan files.
3+
Every business is a software business. Yet software remains the leading source of data breaches. The stakes are too costly to leave it
4+
unprotected and the old methods just don't work anymore.
45

5-
## Getting Started
6+
Contrast Security makes software self-protecting so it can defend itself from vulnerabilities & attacks.
7+
Contrast eliminates risk to software applications and their data.
68

7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
9+
Website: https://www.contrastsecurity.com/

crashtest_security/README.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
1-
# Sample Scan Files
1+
-Crashtest Security-
22

3-
Repository for sample scan files.
3+
The Crashtest Security Suite fits the needs of agile development teams programming web applications and APIs. With the black-box approach it checks for common web app vulnerabilities, e.g. the OWASP Top 10.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://crashtest-security.com/product
6+
Github: https://github.com/crashtest-security/gist

dawnscanner/README.md

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
-Dawnscanner-
2+
3+
Dawnscanner is a source code scanner designed to review your ruby code for security issues. Dawnscanner is able to scan plain ruby scripts (e.g. command line applications) but all its features are unleashed when dealing with web applications source code. It supports major MVC (Model View Controller) frameworks, out of the box:
4+
5+
Website: https://dawnscanner.org/
6+
Github: https://github.com/thesp0nge/dawnscanner

defect_dojo/README.md

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
-Defect Dojo-
2+
3+
This is a sample Defect Dojo instance that can be loaded via loaddata into an instance of a defectdojo server.

dependency_check/README.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
1-
# Sample Scan Files
1+
-Dependency Check-
22

3-
Repository for sample scan files.
3+
Dependency-Check is a software composition analysis utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities. Currently, Java and .NET are supported; additional experimental support has been added for Ruby, Node.js, Python, and limited support for C/C++ build systems (autoconf and cmake). The tool can be part of a solution to the OWASP Top 10 2017 A9-Using Components with Known Vulnerabilities previously known as OWASP Top 10 2013 A9-Using Components with Known Vulnerabilities.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://www.owasp.org/index.php/OWASP_Dependency_Check
6+
Github: https://github.com/jeremylong/DependencyCheck

fortify/README.md

+3-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,5 @@
1-
# Sample Scan Files
1+
-Fortify-
22

3-
Repository for sample scan files.
3+
Micro Focus Fortify Static Code Analyzer reduces software risk by identifying security vulnerabilities that pose the biggest threats to your organization. It pinpoints the root cause of the vulnerability, correlates and prioritizes results, and provides best practices so developers can develop code more securely.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://www.microfocus.com/en-us/products/static-code-analysis-sast/how-it-works

generic/README.md

+2-10
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,3 @@
1-
# Sample Scan Files
1+
-Generic-
22

3-
Repository for sample scan files.
4-
5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
3+
Generic uses a csv file with columns corresponding to findings and their data.

gosec/README.md

+3-13
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,5 @@
1-
# Sample Scan Files
1+
-Gosec-
22

3-
Repository for sample scan files.
3+
Inspects source code for security problems by scanning the Go AST.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
## References
10-
gosec - golang security checker: https://github.com/securego/gosec
11-
Golang Vulnerable App: https://github.com/0c34/govwa
12-
13-
### Notice
14-
15-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Github: https://github.com/securego/gosec

immuniweb/README.md

+7
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
-ImmuniWeb-
2+
3+
ImmuniWeb® AI Platform leverages Machine Learning and AI for intelligent automation and acceleration of
4+
threat-aware penetration testing. Driven by human intelligence, it rapidly detects even the
5+
most sophisticated vulnerabilities and comes with a zero false-positives SLA.
6+
7+
Website: https://www.immuniweb.com/technology/

kiuwan/README.md

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
-Kiuwan-
2+
3+
Automatically scan your code to identify and remediate vulnerabilities. Compliant with the most stringent security standards, such as OWASP and CWE, Kiuwan Code Security covers all important languages and integrates with leading DevOps tools.
4+
5+
Website: https://www.kiuwan.com/code-security-sast/

microfocus_webinspect/README.md

+3-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,5 @@
1-
# Sample Scan Files
1+
-Microfocus Webinspect-
22

3-
Repository for sample scan files.
3+
Micro Focus WebInspect is an automated dynamic testing solution that discovers configuration issues, and identifies and prioritizes security vulnerabilities in running applications. It mimics real-world hacking techniques and provides comprehensive dynamic analysis of complex web applications and services. WebInspect dashboards and reports provide organizations with visibility and an accurate risk posture of your applications.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://www.microfocus.com/en-us/products/webinspect-dynamic-analysis-dast/how-it-works

mobsf/README.md

+4-8
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,7 @@
1-
# Sample Scan Files
1+
-Mobsf-
22

3-
Repository for sample scan files.
3+
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static, dynamic and malware analysis. It can be used for effective and fast security analysis of Android, iOS and Windows mobile applications and support both binaries (APK, IPA & APPX ) and zipped source code. MobSF can do dynamic application testing at runtime for Android apps and has Web API fuzzing capabilities powered by CapFuzz, a Web API specific security scanner. MobSF is designed to make your CI/CD or DevSecOps pipeline integration seamless.
44

5-
## Getting Started
5+
-NO SAMPLE SCAN FILES ARE AVAILABLE AT THIS TIME-
66

7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
7+
Github: https://github.com/MobSF/Mobile-Security-Framework-MobSF

mozilla_observatory/README.md

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
-Mozilla Observatory-
2+
3+
The Mozilla Observatory has helped over 170,000 websites by teaching developers, system administrators, and security professionals how to configure their sites safely and securely.
4+
5+
Website: https://observatory.mozilla.org/
6+
Github: https://github.com/mozilla/http-observatory

nessus/README.md

+3-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,5 @@
1-
# Sample Scan Files
1+
-Nessus-
22

3-
Repository for sample scan files.
3+
Nessus was built from the ground-up with a deep understanding of how security practitioners work. Every feature in Nessus is designed to make vulnerability assessment simple, easy and intuitive. The result: less time and effort to assess, prioritize, and remediate issues.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://www.tenable.com/products/nessus

netsparker/README.md

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
-Netsparker-
2+
3+
Netsparker is an easy to use and fully automated web application security scanner that uses the advanced Proof-Based ScanningTM technology to identify SQL Injection, Cross-site Scripting (XSS) and thousands of other vulnerabilities in web applications, web services and web APIs. The Netsparker web vulnerability scanner also has built-in security testing tools, reports generator, and can be easily integrated in your SDLC, DevOps and other environments.
4+
5+
Website: https://www.netsparker.com/web-vulnerability-scanner/

nexpose/README.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
1-
# Sample Scan Files
1+
-Nexpose-
22

3-
Repository for sample scan files.
3+
Nexpose, Rapid7’s on-premise option for vulnerability management software, monitors exposures in real-time and adapts to new threats with fresh data, ensuring you can always act at the moment of impact.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://www.rapid7.com/products/nexpose/
6+
Github: https://github.com/rapid7/nexpose-client/releases/tag/v7.2.1

nikto/README.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
1-
# Sample Scan Files
1+
-Nikto-
22

3-
Repository for sample scan files.
3+
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers.
44

5-
## Getting Started
6-
7-
Upload the sample file to the folder of the scanner. If the scanner folder is not there then please create it with the submission. The file should be in the format, <scanner_name>\_v<x.x>.ext
8-
9-
### Notice
10-
11-
Please do not upload any production data as the scan files are intended to be scrubbed or against demo systems.
5+
Website: https://cirt.net/Nikto2
6+
Github: https://github.com/sullo/nikto

0 commit comments

Comments
 (0)