sylkie – IPv6 address spoofing with the Neighbor Discovery Protocol ylkie ...

Tutorial: Install Harbor for Image Vulnerability Scanning Given Docker Hub’s new throttling ...

Github Code Scanning: vulnerability scanner by Justin Hutchings GitHub code scanning is ...

France’s COVID-19 contact tracing app is now tested by 15,000+ ethical ...

Recox – Master script for web reconnaissance Recox v1.0 is the ...

PwnDoc is a pentest reporting application making it simple and easy ...

hackerEnv is an automation tool that quickly and easily sweeps IPs ...

CSRFER is a tool to generate csrf payloads, based on vulnerable ...

GitHub releases the Security Vulnerabilities Code Scanning Tool for All Users GitHub is releasing a new code scanning tool to help developers identify vulnerabilities before the software is created.  The tool was initially revealed at the GitHub Satellite Conference in May, as it is only accessible to GitHub beta testers. Now, for all users, the GitHub code scanning tool is available and will allow it to form a public repository. The latest tool is the product of last year’s Semmle acquisition.  Semmle is a forum for code analysis that lets developers write queries that recognise code patterns and check for vulnerabilities and their variants in large codebases.  GitHub said they “worked to introduce the CodeQL technology ‘s groundbreaking code analysis capabilities to GitHub users as a native capability.” Code scanning tool for GitHub users, powered by powerful CodeQL code analysis engine technology as a native capability. To optimise versatility for your team, the tool is integrated with GitHub Behavior or your current CI / CD setting.  The tool scans over “12,000 repositories 1.4 million times since the launch of the beta version, and identified more than 20,000 security problems like remote code execution (RCE), SQL injection, and cross-site scripting (XSS) vulnerabilities.” The tool helped ...