-
I tried adding a very simple step in my tox build to check that my readme is correct:
```
[testenv:readme]
deps =
restructuredtext-lint
skip_install = true
commands = rst-lint README.rst
…
-
-
Hi,
Great tool! thanks for sharing.
Does the brute force functionality work? It doesn't display any output and domains that this module successfully finds, and it seems to be finished quite quickl…
-
+] welcome to autosploit, give us a little bit while we configure
[i] checking your running platform
[i] checking for disabled services
[-] no arguments have been parsed, defaulting to terminal ses…
-
When using .co.za domain, it thinks za is the TLD and co is the domain...
-
Question for colleagues -
- Anyone have time to run some queries on the CT logs (and other tools) on how many IV certs are currently logged?
- **General questions on the table are:**
- Pol…
-
The following protocols are advertised as supported, but have no unit tests:
* AXFR
* CNAME
* DMARC
* TXT
* SOA
* SPF
We should also probably build out the framework so it tests iterative …
-
Did a source code analysis and found the following bugs in Datasploit :
### `active_default_file_check.py`
- [ ] `host` is blindly suffixed with `http://` without checking if host already contains …
-
When we discover a certificate that makes a server vulnerable to DROWN, we should check that the certificate is publicly trusted, and that includes checking for revocation. See here for the origin of …
ivanr updated
7 years ago
-
Hello,
we are an ISP in germany and - as your ssllabs servercheck is great in general - many customers check their servers with us with your online tool.
The problem is, that the DROWN check is wr…