Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Twa | 554 | a year ago | 3 | mit | Shell | |||||
A tiny web auditor with strong opinions. | ||||||||||
The Zoo | 80 | a year ago | 47 | mit | Python | |||||
🐒 A service registry for humans | ||||||||||
Wp Theme Auditor | 54 | 3 years ago | 1 | October 14, 2019 | 4 | gpl-2.0 | JavaScript | |||
Accessibility auditing tools for WordPress themes. | ||||||||||
Packit | 40 | 4 months ago | 3 | gpl-2.0 | C | |||||
network packet generator and capture tool | ||||||||||
Caulking | 25 | 2 months ago | 14 | other | Shell | |||||
Prevent leaks with gitleaks, and use tests to validate | ||||||||||
Saltstack Infratest Module | 23 | 5 years ago | 1 | gpl-3.0 | Python | |||||
A Salt module using the testinfra python module for infrastructure compliance testing and auditing. | ||||||||||
Sledgehammer | 19 | 3 years ago | gpl-3.0 | Python | ||||||
:hammer: :signal_strength: WiFi-Jammer/DoS toolset | ||||||||||
Medaudit | 9 | 3 years ago | 2 | apache-2.0 | Python | |||||
A tool for auditing medical devices and healthcare infrastructure | ||||||||||
Splunk Ref Pas Test | 8 | 8 years ago | Python | |||||||
Splunk Reference App - Pluggable Auditing System (PAS) - Test Repo | ||||||||||
Audittestsuite | 7 | 4 years ago | bsd-2-clause | C | ||||||
An implementation of Regression Test Suite for FreeBSD Audit Framework [GSoC-18] |
The FSL Test bench provides a save environment for security auditing and testing and can be used for teaching security testing methodologies. At the moment the focus lies on web applications. All application are running on top of a current Fedora installation with a Lighttpd web server and a MySQL server.
The FSL Test bench includes:
All applications are directly accessible from a bootstrap-based website.
The FSL Test bench repository contains a subset of playbooks from the fedora-ansible git repository maintained by Fabian Affolter.
If you have just found Ansible or the Fedora Security Lab, you should start here:
The setup of Ansible is explained on the Ansible Getting Started page. Here is only the setup of the managed nodes and special details for the management system covered. For every system you want to manage, you need to have the client's SSH key in the authorized_keys file of the managed system and Python.
Make sure that Python is installed. If not, install the Python package on the managed node(s). If you have performed a minimal Fedora installation Python is available.
$ sudo dnf -y install python
The playbooks will use DNF as package management software instead of yum
as
soon as DNF is the default Package management tool in Fedora. But for now,
everything is done with yum
.
Add the SSH key to the authorized_keys file. Assuming you are logged-in with SSH on your management system.
sudo ssh-copy-id -i /root/.ssh/id_rsa.pub [email protected][IP address of your managed note]
The file /etc/ansible/hosts shall contain all hosts to be setup up.
After cloning this git repository, edit the variables/sensitive.yml file if you don't want to use password as default password.
The documentation is available at Read the Docs.
At the moment the structure of the repository looks like this:
.
├── all-in-one.yml -------- FSL Test bench on a single machine
├── docs ------------------ Documentation
├── files ----------------- Template files
│ ├── cgi --------------- Source files for CGI
│ ├── kickstart --------- Kickstart files
│ └── web-interface ----- All files for the web interface
├── fsl-packages-sync.py -- Python script to sync with FSL package list
├── fsl-tb-detect.nse ----- nmap script for the Test bench detection
├── fsl.yml ---------------
├── handlers -------------- Handlers for services
├── INSTALL.md ------------ Installation guide
├── local-setup.yml -------
├── openvpn-server.yml ----
├── README.md ------------- This files
├── tasks ----------------- A collection of tasks (all playbooks)
│ ├── apps -------------- Vulnerable web applications
│ ├── cgi --------------- CGI
│ ├── db-servers -------- Database servers
│ ├── directory-servers - Directory Servers
│ ├── file-servers ------ File servers
│ ├── ftp-servers ------- FTP servers
│ ├── helpers ----------- Helper tools
│ ├── honeypots --------- Low-interaction honeypots
│ ├── mail-servers ------ Mail server
│ ├── misc-servers ------ Various servers
│ └── shells ------------ PHP shells
│ └── web-servers ------- Web servers
└── variables ------------- Storage files for variables
The file variables/sensitive.yml contains most application passwords. If you don't want to run with default password, edit this file according your needs and keep it save outside the repository.
All playbook content is assumed to be Creative Commons 3.0 Attribution licensed. Non-commercial or No-derivatives CC extensions are not acceptable, to encourage easy use by all users, regardless of purpose.