From beb5b1c4a0b7ddacf690a01196f9bd329c244822 Mon Sep 17 00:00:00 2001 From: fabacab Date: Sat, 6 Feb 2021 08:07:22 -0500 Subject: [PATCH 1/4] Add OSV, a vuln DB with an API for open source software. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 0eec9cc..40302cb 100644 --- a/README.md +++ b/README.md @@ -759,6 +759,7 @@ See also [awesome-social-engineering](https://github.com/v2-dev/awesome-social-e * [Microsoft Security Advisories and Bulletins](https://docs.microsoft.com/en-us/security-updates/) - Archive and announcements of security advisories impacting Microsoft software, published by the Microsoft Security Response Center (MSRC). * [Mozilla Foundation Security Advisories](https://www.mozilla.org/security/advisories/) - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser. * [National Vulnerability Database (NVD)](https://nvd.nist.gov/) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine. +* [Open Source Vulnerabilities (OSV)](https://osv.dev/) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version. * [Packet Storm](https://packetstormsecurity.com/files/) - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry. * [SecuriTeam](http://www.securiteam.com/) - Independent source of software vulnerability information. * [Snyk Vulnerability DB](https://snyk.io/vuln/) - Detailed information and remediation guidance for vulnerabilities known by Snyk. From d826fb11051a2be6b1f6ea867819a272aedf139a Mon Sep 17 00:00:00 2001 From: fabacab Date: Sat, 6 Feb 2021 08:10:14 -0500 Subject: [PATCH 2/4] Add kube-hunter, a Kubernetes pentesting utility. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 40302cb..c3e8ed9 100644 --- a/README.md +++ b/README.md @@ -443,6 +443,7 @@ See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools). ## Network Vulnerability Scanners * [celerystalk](https://github.com/sethsec/celerystalk) - Asynchronous enumeration and vulnerability scanner that "runs all the tools on all the hosts" in a configurable manner. +* [kube-hunter](https://kube-hunter.aquasec.com/) - Open-source tool that runs a set of tests ("hunters") for security issues in Kubernetes clusters from either outside ("attacker's view") or inside a cluster. * [Nessus](https://www.tenable.com/products/nessus-vulnerability-scanner) - Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable. * [Netsparker Application Security Scanner](https://www.netsparker.com/pricing/) - Application security scanner to automatically find security flaws. * [Nexpose](https://www.rapid7.com/products/nexpose/) - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7. From a274d4d88c5caba8c3210a175d969a808c86d479 Mon Sep 17 00:00:00 2001 From: fabacab Date: Sat, 6 Feb 2021 08:22:13 -0500 Subject: [PATCH 3/4] Remove 0xED as it now 404's on the official site. --- README.md | 1 - 1 file changed, 1 deletion(-) diff --git a/README.md b/README.md index c3e8ed9..031ecf7 100644 --- a/README.md +++ b/README.md @@ -267,7 +267,6 @@ See also *[Reverse Engineering Tools](#reverse-engineering-tools)*. ## Hex Editors -* [0xED](http://www.suavetech.com/0xed/0xed.html) - Native macOS hex editor that supports plug-ins to display custom data types. * [Bless](https://github.com/bwrsandman/Bless) - High quality, full featured, cross-platform graphical hex editor written in Gtk#. * [Frhed](http://frhed.sourceforge.net/) - Binary file editor for Windows. * [Hex Fiend](http://ridiculousfish.com/hexfiend/) - Fast, open source, hex editor for macOS with support for viewing binary diffs. From 5566085e47e96d2d02266d2cd592a16dc16932ee Mon Sep 17 00:00:00 2001 From: fabacab Date: Sat, 6 Feb 2021 08:27:10 -0500 Subject: [PATCH 4/4] Remove peCloak.py as its host now consistently returns HTTP 500 error. --- README.md | 1 - 1 file changed, 1 deletion(-) diff --git a/README.md b/README.md index 031ecf7..3f18373 100644 --- a/README.md +++ b/README.md @@ -114,7 +114,6 @@ See also [awesome-tor](https://github.com/ajvb/awesome-tor). * [Shellter](https://www.shellterproject.com/) - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. * [UniByAv](https://github.com/Mr-Un1k0d3r/UniByAv) - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key. * [Veil](https://www.veil-framework.com/) - Generate metasploit payloads that bypass common anti-virus solutions. -* [peCloak.py](https://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/) - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection. * [peCloakCapstone](https://github.com/v-p-b/peCloakCapstone) - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool. ## Books