You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 14, 2020. It is now read-only.
Copy file name to clipboardExpand all lines: scanners/amass/README.md
-23Lines changed: 0 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,14 +14,6 @@ The OWASP Amass Project has developed a tool to help information security profes
14
14
15
15
<!-- end -->
16
16
17
-
## Deployment
18
-
19
-
The AMASS scanType can be deployed via helm:
20
-
21
-
```bash
22
-
helm upgrade --install amass ./scanners/amass/
23
-
```
24
-
25
17
## Configuration
26
18
27
19
The following security scan configuration example are based on the [Amass User Guide], please take a look at the original documentation for more configuration examples.
@@ -36,21 +28,6 @@ Special command line options:
36
28
* Disable saving data into a local database `amass enum -nolocaldb -d example.com`
37
29
* Domain names separated by commas (can be used multiple times) `amass enum -d example.com`
38
30
39
-
## Development
40
-
41
-
### Local setup
42
-
43
-
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
44
-
2. Ensure you have node.js installed
45
-
* On MacOs with brew package manager: `brew install node`
46
-
47
-
### Parser Development
48
-
49
-
1. Install the dependencies `npm install`
50
-
2. Update the parser function here: `./parser/parser.js`
51
-
3. Update the parser tests here: `./parser/parser.test.js`
The following security scan configuration example are based on the [kube-hunter Documentation], please take a look at the original documentation for more configuration examples.
@@ -30,21 +22,6 @@ The following security scan configuration example are based on the [kube-hunter
30
22
* To specify interface scanning, you can use the --interface option (this will scan all of the machine's network interfaces). Example: `kube-hunter --interface`
31
23
* To specify a specific CIDR to scan, use the --cidr option. Example: `kube-hunter --cidr 192.168.0.0/24`
32
24
33
-
## Development
34
-
35
-
### Local setup
36
-
37
-
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
38
-
2. Ensure you have node.js installed
39
-
* On MacOs with brew package manager: `brew install node`
40
-
41
-
### Parser Development
42
-
43
-
1. Install the dependencies `npm install`
44
-
2. Update the parser function here: `./parser/parser.js`
45
-
3. Update the parser tests here: `./parser/parser.test.js`
Copy file name to clipboardExpand all lines: scanners/nikto/README.md
-23Lines changed: 0 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,14 +14,6 @@ Nikto is a free software command-line vulnerability scanner that scans webserver
14
14
15
15
<!-- end -->
16
16
17
-
## Deployment
18
-
19
-
The Nikto ScanType can be deployed via helm:
20
-
21
-
```bash
22
-
helm upgrade --install nikto ./scanners/nikto/
23
-
```
24
-
25
17
## Configuration
26
18
27
19
The following security scan configuration example are based on the [Nikto Documentation](https://cirt.net/nikto2-docs/usage.html#id2780332), please take a look at the original documentation for more configuration examples.
@@ -49,20 +41,5 @@ Nikto also has a comprehensive list of [command line options documented](https:/
49
41
* c - Remote source inclusion. Software allows remote inclusion of source code.
50
42
* x - Reverse Tuning Options. Perform exclusion of the specified tuning type instead of inclusion of the specified tuning type
51
43
52
-
## Development
53
-
54
-
### Local setup
55
-
56
-
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
57
-
2. Ensure you have node.js installed
58
-
* On MacOs with brew package manager: `brew install node`
59
-
60
-
### Parser Development
61
-
62
-
1. Install the dependencies `npm install`
63
-
2. Update the parser function here: `./parser/parser.js`
64
-
3. Update the parser tests here: `./parser/parser.test.js`
Copy file name to clipboardExpand all lines: scanners/ssh_scan/README.md
-23Lines changed: 0 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,14 +14,6 @@ To learn more about the ssh_scan scanner itself visit [ssh_scan GitHub].
14
14
15
15
<!-- end -->
16
16
17
-
## Deployment
18
-
19
-
The SSH_scan ScanType can be deployed via helm.
20
-
21
-
```bash
22
-
helm upgrade --install ssh ./scanners/ssh_scan/
23
-
```
24
-
25
17
## Configuration
26
18
27
19
The following security scan configuration example are based on the [ssh_scan Documentation], please take a look at the original documentation for more configuration examples.
Copy file name to clipboardExpand all lines: scanners/sslyze/README.md
-27Lines changed: 0 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,14 +12,6 @@ SSLyze is a Python library and a CLI tool that can analyze the SSL configuration
12
12
13
13
<!-- end -->
14
14
15
-
## Deployment
16
-
17
-
The SSLyze scanType can be deployed via helm:
18
-
19
-
```bash
20
-
helm upgrade --install sslyze ./scanners/sslyze/
21
-
```
22
-
23
15
## Configuration
24
16
25
17
The following security scan configuration example are based on the [SSLyze Documentation], please take a look at the original documentation for more configuration examples.
@@ -129,24 +121,5 @@ Options:
129
121
vulnerability (CVE-2014-0224).
130
122
```
131
123
132
-
## Development
133
-
134
-
### Local setup
135
-
136
-
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
137
-
2. Ensure you have node.js installed
138
-
* On MacOs with brew package manager: `brew install node`
139
-
140
-
### Parser Development
141
-
142
-
1. Install the dependencies `npm install`
143
-
2. Update the parser functionhere:`./parser/parser.js`
144
-
3. Update the parser tests here: `./parser/parser.test.js`
145
-
4. Run the test suite: `npm test`
146
-
147
-
#### Basic scanner tests
148
-
149
-
If you want to test sslyze localy you can use brew (only on macOS) to install it: `brew install sslyze`
0 commit comments