Miroslav Stampar
Miroslav Stampar
This is a project under 100 lines which should cover majority of XSS vulnerabilities. It doesn't have a true-positive or false-positive detection mechanism, neither it could be implemented into such...
With the latest patch problem related to the https://github.com/stamparm/DSXS/issues/5#issuecomment-356805571 should be gone
With the latest patch problem related to the https://github.com/stamparm/DSXS/issues/5#issue-286990471 should be gone, though... Now the new problem arise where another rule is being triggered because the original content is actually...
@phackt private project, developed in several occasions (cca. two months of development time). Greasemonkey script created for automated vulnerability assessment (with similar (though improved) web application security heuristics as in...
You mean something like https://stackoverflow.com/a/15580768 ? I could just put a reference link to that same answer inside the README
@conexioninversa what's the confidences level of C2_XXX lists at https://github.com/conexioninversa/MalwareIntel ? i mean, this all looks like a fresh set of lists, while it would be pity to push FPs...
@netsysadm I believe that you are trying to push syslog/CEF messages, while Graylog in your case expects GELF: 
@netsysadm https://www.graylog.org/post/how-to-use-graylog-as-a-syslog-server
1) Looks like a good idea, though, I would really need something "tangible"/useful/generic 2) What to do if there is a burst of "high" severity events?
1) you can always access the current date's log with: ``` cat /var/log/maltrail/$(date +"%Y-%m-%d").log ``` 2) in some point in time i'll introduce .gz. Also, I am not very keen...