Kepler is a vulnerability database and lookup store and API currently utilising National Vulnerability Database and NPM Advisories as data sources

Overview

Kepler — Lint and Tests License


Kepler is a vulnerability database and lookup store and API currently utilising National Vulnerability Database and NPM Advisories as data sources; implementing CPE 2.3 tree expressions and version range evaluation in realtime.


Setup

Pre-requisites

  • docker;
  • rust nightly >= 1.33;
  • (optional) python 3.x.

Build & run

docker compose build
docker compose up

While the database is running, perform the database migrations (rust and libpg-dev required):

export DATABASE_URL=postgres://kepler:kepler@localhost:5432/kepler

cargo install diesel_cli --no-default-features --features "postgres"
diesel migration run	

The system will automatically fetch and import new records every 3 hours, while historical data must be imported manually (see importing data sources).

Data sources

Kepler currently supports two data sources, National Vulnerability Database and NPM Advisories. You can import the data sources historically as follows.

NIST Data

To import NIST records from all available years (2002 to 2022):

for year in $(seq 2002 2022); do 
    docker run -v $(pwd)/data:/data \
        -e DATABASE_URL=postgres://kepler:kepler@localhost:5432/kepler \
	--network=kepler_default \
	kepler:dev import_nist $year -d /data; 
done 

NPM Data

To import all available NPM records:

docker run -v $(pwd)/data:/data \
    -e DATABASE_URL=postgres://kepler:kepler@localhost:5432/kepler\
    --network=kepler_default \
    kepler:dev import_npm -d /data; 

The system will automatically fetch and import new records records every 3 hours.

APIs

There are two primary APIs as of right now — the product API and the cve API detailed below.

Products API

Products can be listed:

curl http://localhost:8000/products

Grouped by vendor:

curl http://localhost:8000/products/by_vendor

Or searched:

curl http://localhost:8000/products/search/iphone

CVEs API

To use the vulnerabilities search API via cURL (prepend node- to the product name in order to search for NPM specific packages):

curl \
    --header "Content-Type: application/json" \
    --request POST \
    --data '{"product":"libxml2","version":"2.9.10"}' \
    http://localhost:8000/cve/search

Responses are cached in memory with a LRU limit of 4096 elements.

Utility

To get test and visualize the API results quickly you can use the Python utility wrappers.

pip install -r requirements-cli.txt
./kepler_cli.py linux_kernel $(uname -r)

It is also possible to use the CLI to see the difference in terms of CVEs between two revisions of the same software:

diff -Naur --color <(./kepler_cli.py chrome 93.0.4577.62) <(./kepler_cli.py chrome 93.0.4577.63)
JSON response for query: {"product":"libxml2","version":"2.9.10"}
```json
[
    {
        "source": "NIST",
        "vendor": "xmlsoft",
        "product": "libxml2",
        "cve": "CVE-2021-3517",
        "summary": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.",
        "score": 7.5,
        "severity": "HIGH",
        "vector": "NETWORK",
        "references": [
            {
                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232",
                "tags": [
                    "Issue Tracking",
                    "Patch",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/",
                "tags": []
            },
            {
                "url": "https://security.netapp.com/advisory/ntap-20210625-0002/",
                "tags": []
            },
            {
                "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
                "tags": []
            },
            {
                "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
                "tags": []
            },
            {
                "url": "https://security.gentoo.org/glsa/202107-05",
                "tags": []
            }
        ]
    },
    {
        "source": "NIST",
        "vendor": "xmlsoft",
        "product": "libxml2",
        "cve": "CVE-2021-3518",
        "summary": "There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.",
        "score": 6.8,
        "severity": "MEDIUM",
        "vector": "NETWORK",
        "references": [
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242",
                "tags": [
                    "Issue Tracking",
                    "Patch",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/",
                "tags": []
            },
            {
                "url": "https://security.netapp.com/advisory/ntap-20210625-0002/",
                "tags": []
            },
            {
                "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
                "tags": []
            },
            {
                "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
                "tags": []
            },
            {
                "url": "https://security.gentoo.org/glsa/202107-05",
                "tags": []
            },
            {
                "url": "https://support.apple.com/kb/HT212604",
                "tags": []
            },
            {
                "url": "https://support.apple.com/kb/HT212605",
                "tags": []
            },
            {
                "url": "https://support.apple.com/kb/HT212602",
                "tags": []
            },
            {
                "url": "https://support.apple.com/kb/HT212601",
                "tags": []
            },
            {
                "url": "http://seclists.org/fulldisclosure/2021/Jul/55",
                "tags": []
            },
            {
                "url": "http://seclists.org/fulldisclosure/2021/Jul/54",
                "tags": []
            },
            {
                "url": "http://seclists.org/fulldisclosure/2021/Jul/58",
                "tags": []
            },
            {
                "url": "http://seclists.org/fulldisclosure/2021/Jul/59",
                "tags": []
            }
        ]
    },
    {
        "source": "NIST",
        "vendor": "xmlsoft",
        "product": "libxml2",
        "cve": "CVE-2021-3537",
        "summary": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.",
        "score": 4.3,
        "severity": "MEDIUM",
        "vector": "NETWORK",
        "references": [
            {
                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522",
                "tags": [
                    "Issue Tracking",
                    "Patch",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/",
                "tags": []
            },
            {
                "url": "https://security.netapp.com/advisory/ntap-20210625-0002/",
                "tags": []
            },
            {
                "url": "https://security.gentoo.org/glsa/202107-05",
                "tags": []
            }
        ]
    },
    {
        "source": "NIST",
        "vendor": "xmlsoft",
        "product": "libxml2",
        "cve": "CVE-2021-3541",
        "summary": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.",
        "score": 4.0,
        "severity": "MEDIUM",
        "vector": "NETWORK",
        "references": [
            {
                "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515",
                "tags": [
                    "Issue Tracking",
                    "Patch",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://security.netapp.com/advisory/ntap-20210805-0007/",
                "tags": []
            }
        ]
    },
    {
        "source": "NIST",
        "vendor": "xmlsoft",
        "product": "libxml2",
        "cve": "CVE-2019-20388",
        "summary": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.",
        "score": 5.0,
        "severity": "MEDIUM",
        "vector": "NETWORK",
        "references": [
            {
                "url": "https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68",
                "tags": [
                    "Patch",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/",
                "tags": []
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/",
                "tags": []
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/",
                "tags": []
            },
            {
                "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html",
                "tags": []
            },
            {
                "url": "https://security.netapp.com/advisory/ntap-20200702-0005/",
                "tags": []
            },
            {
                "url": "https://www.oracle.com/security-alerts/cpujul2020.html",
                "tags": []
            },
            {
                "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html",
                "tags": []
            },
            {
                "url": "https://security.gentoo.org/glsa/202010-04",
                "tags": []
            }
        ]
    },
    {
        "source": "NIST",
        "vendor": "xmlsoft",
        "product": "libxml2",
        "cve": "CVE-2020-24977",
        "summary": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.",
        "score": 6.4,
        "severity": "MEDIUM",
        "vector": "NETWORK",
        "references": [
            {
                "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/178",
                "tags": [
                    "Exploit",
                    "Patch",
                    "Vendor Advisory"
                ]
            },
            {
                "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://security.netapp.com/advisory/ntap-20200924-0001/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2",
                "tags": [
                    "Patch",
                    "Vendor Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://security.gentoo.org/glsa/202107-05",
                "tags": []
            }
        ]
    },
    {
        "source": "NIST",
        "vendor": "xmlsoft",
        "product": "libxml2",
        "cve": "CVE-2020-7595",
        "summary": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.",
        "score": 5.0,
        "severity": "MEDIUM",
        "vector": "NETWORK",
        "references": [
            {
                "url": "https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076",
                "tags": [
                    "Patch",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://usn.ubuntu.com/4274-1/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html",
                "tags": [
                    "Broken Link"
                ]
            },
            {
                "url": "https://security.netapp.com/advisory/ntap-20200702-0005/",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://www.oracle.com/security-alerts/cpujul2020.html",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://security.gentoo.org/glsa/202010-04",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf",
                "tags": [
                    "Third Party Advisory"
                ]
            },
            {
                "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08",
                "tags": [
                    "Third Party Advisory",
                    "US Government Resource"
                ]
            }
        ]
    }
]
```
Comments
  • add more cve fields

    add more cve fields

    add more cve fields

    add some missing fields to the cve response

    I have

    • [x] run cargo fmt;
    • [x] run cargo clippy;
    • [x] run cargo testand all tests pass;
    • [ ] linked to the originating issue (if applicable).
    opened by banditopazzo 0
  • Workspace refactor

    Workspace refactor

    Workspace refactor

    Complete workspace refactor

    Remove

    • cli (poorly implemented)
    • npm (not working)

    I have

    • [x] run cargo fmt;
    • [x] run cargo clippy;
    • [x] run cargo testand all tests pass;
    • [ ] linked to the originating issue (if applicable).
    opened by banditopazzo 0
  • Restructure

    Restructure

    Restructure

    Project refactoring

    I have

    • [x] run cargo fmt;
    • [x] run cargo clippy;
    • [x] run cargo testand all tests pass;
    • [ ] linked to the originating issue (if applicable).
    opened by banditopazzo 0
  • Bump regex from 1.5.4 to 1.5.5

    Bump regex from 1.5.4 to 1.5.5

    Bumps regex from 1.5.4 to 1.5.5.

    Changelog

    Sourced from regex's changelog.

    1.5.5 (2022-03-08)

    This releases fixes a security bug in the regex compiler. This bug permits a vector for a denial-of-service attack in cases where the regex being compiled is untrusted. There are no known problems where the regex is itself trusted, including in cases of untrusted haystacks.

    Commits

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 0
  • Version updates

    Version updates

    Version updates

    The pull requests aims to update dependencies of the project. All dependencies are updated to the latest version.

    Notable mentions:

    • actix_web and all related dependencies finally exit from beta/rc
    • clap deprecates some library apis
    • version-compare changed library apis

    I have

    • [x] run cargo fmt;
    • [x] run cargo clippy;
    • [x] run cargo testand all tests pass;
    enhancement 
    opened by banditopazzo 0
  • Embedded database setup and migration

    Embedded database setup and migration

    The scope of the pull request is to remove the dependency on diesel cli so I embed the creation of the diesel schema table and a check for migrations on the application startup.

    it's possible to apply the migration automatically on the startup or exit with an error if a migration is needed

    opened by banditopazzo 0
  • Actix migration

    Actix migration

    Actix migration

    Switched web framework from rocket to actix to standardize to other exein products

    Implementation (Optional)

    Replaced web framework and adapted handlers. Wrapped every diesel request into an actix web::block function.

    I have

    • [x] run cargo fmt;
    • [x] run cargo clippy;
    • [x] run cargo testand all tests pass;
    • [x] linked to the originating issue (if applicable).
    enhancement test needed 
    opened by banditopazzo 0
  • Refactoring the updater to remove ofelia dependency

    Refactoring the updater to remove ofelia dependency

    Currently running Kepler in a cloud environment is quite difficult due to needing two separate services (kepler & ofelia) to share the same filesystem (ofelia calling kepler binary directly). Since the scope of ofelia is fairly small, we should consider removing it entirely and embedding the updater within kepler itself as a single service.

    good first issue question 
    opened by JuxhinDB 0
Owner
Exein.io
Next generation IoT device security. Stay tuned for exciting news ahead!
Exein.io
Http request smuggling vulnerability scanner

Request smuggler Http request smuggling vulnerability scanner Based on the amazing research by James Kettle. The tool can help to find servers that ma

null 204 Dec 18, 2022
💔 Heartbleed vulnerability exploit written in Rust

Heartbleed ?? Heartbleed vulnerability exploit written in Rust What is it Heartbleed is a buffer over-read vulnerability in outdated versions of OpenS

Gianmatteo Palmieri 4 May 23, 2023
Rslide - A web service that allows you to move through multiple html pages in the browser like a slide, even without focusing on the app console or the browser. Currently only supports Windows.

rslide rslide is a web service that allows you to move through multiple html pages in the browser like a slide, even without focusing on the app conso

Jason Dongheng Lee 3 Jan 1, 2022
Minimal and persistent key-value store designed with security in mind

microkv Minimal and persistent key-value store designed with security in mind. Introduction microkv is a persistent key-value store implemented in Rus

Alan 17 Jan 2, 2023
cert_installer - a utility that adds a CA certificate to Android's System Trust Store

cert_installer is a utility that adds a CA certificate to Android's System Trust Store by overwriting the /system/etc/security/cacerts directory with a tmpfs mount. Changes made to the System Trust Store is not persistant across reboots.

Terry Chia 5 Apr 11, 2022
Security advisory database for Rust crates published through crates.io

RustSec Advisory Database The RustSec Advisory Database is a repository of security advisories filed against Rust crates published via https://crates.

RustSec 682 Jan 1, 2023
A utility like pkg-audit for Arch Linux. Based on Arch Security Team data.

arch-audit pkg-audit-like utility for Arch Linux. Based on data from security.archlinux.org collected by the awesome Arch Security Team. Installation

Andrea Scarpino 316 Nov 22, 2022
QuickCheck bug hunting in Rust standard library data structures

BugHunt, Rust This project is aiming to provide "stateful" QuickCheck models for Rust's standard library. That is, we build up a random list of operat

Brian L. Troutwine 161 Dec 15, 2022
Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pentesters. Written in Rust.

Ronflex Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for penteste

null 5 Apr 17, 2023
Safe Rust interface to the Vulkan API.

Magma: A strictly typed Vulkan API interface. Magma is a strictly typed Rust interface for the vulkan API. This means that whenever possible, the well

null 1 Oct 11, 2022
BGPKIT Parser aims to provides the most ergonomic MRT/BGP/BMP message parsing Rust API.

BGPKIT Parser aims to provides the most ergonomic MRT/BGP/BMP message parsing Rust API.

BGPKIT 46 Dec 19, 2022
Steals browser passwords and cookies and sends to webhook.

Browser-Stealer Steals browser passwords and cookies and sends to webhook. Donating Educational Purposes Only This code is made so you can learn from

RadonCoding 3 Sep 27, 2021
Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode

Xori - Custom disassembly framework Xori is an automation-ready disassembly and static analysis library that consumes shellcode or PE binaries and pro

ENDGAME 712 Nov 28, 2022
🕵️‍♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️

Recon Find, locate, and query files for ops and security experts Key Features • How To Use • Download • Contributing • License Key Features Query with

Rusty Ferris Club 11 Dec 16, 2022
Semi-automatic OSINT framework and package manager

sn0int sn0int (pronounced /snoɪnt/) is a semi-automatic OSINT framework and package manager. It was built for IT security professionals and bug hunter

null 1.4k Dec 31, 2022
A Comprehensive Web Fuzzer and Content Discovery Tool

rustbuster A Comprehensive Web Fuzzer and Content Discovery Tool Introduction Check the blog post: Introducing Rustbuster — A Comprehensive Web Fuzzer

Francesco Soncina 467 Dec 26, 2022
A simple menu to keep all your most used one-liners and scripts in one place

Dama Desktop Agnostic Menu Aggregate This program aims to be a hackable, easy to use menu that can be paired to lightweight window managers in order t

null 47 Jul 23, 2022
link is a command and control framework written in rust

link link is a command and control framework written in rust. Currently in alpha. Table of Contents Introduction Features Feedback Build Process Ackno

null 427 Dec 24, 2022
A simple scanner that loops through ips and checks if a minecraft server is running on port 25565

scanolotl Scanolotl is a simple scanner that loops through ips and checks if a minecraft server is running on port 25565. Scanolotl can also preform a

JustFr33z 3 Jul 28, 2022