-
Using the twint module, is there a way to store data in dicts or lists?
I know the data can be written to csv/json files with twint.run.Search(c), as well as printing to terminal.
I'm intere…
-
In Absinthe's complexity analysis [doc](https://hexdocs.pm/absinthe/complexity-analysis.html#complexity-analysis), there is an example of calculating complexity based on the list size with the `limit`…
-
Hey there!
I belong to an open source security research community, and a member (@haxatron) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly add a …
-
Hey,
I am not good with rust but I noticed that you had the platform detection JSON hardcoded in [platform.rs](https://github.com/TheBinitGhimire/NtHiM/blob/main/src/platforms.rs#L15).
It would …
-
We have to manage roles with following hierarchy
ROLE_ADMIN - Can do anything
ROLE_PENTESTER - Can do the same as MANAGER and manage vulns, view only his missions, manage only his own account
ROL…
-
**Description**
Guzzle can help php teams to protect against SSRF with a new client option: `force_base_uri`.
**Example of vulnerable code:**
```php
use Guzzle\Http\Client;
$client = new Client…
sbani updated
3 years ago
-
**Is your feature request related to a problem? Please describe.**
The Tyk API Gateway does not require users to choose strong passwords.
No password complexity is enforced, and the minimum password…
-
+1 for a formal schema for the v3 api as to ease automatic client generations (api explorer, java sdk, go sdk...) (e.g. swagger format)
Automated tests on the formal schema may also help checking t…
-
Hi!
Open source maintainers usually receive a lot of feedback about vulnerabilities found by security tools in open source projects. Sometimes, the quality of the information provided is not very goo…
-
### Problem
When pentesters poke around the DEV codebase they often end up causing a lot of errors as they try to break things. Most of the times these errors are not actually security vulnerabilitie…