CodeSentinel - vulnerability analyzer #36
boloto1979
started this conversation in
General
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
This version can be used in real projects on a daily basis. Please feel comfortable writing me any possible errors.
Vulnerabilities in this version: Code injection, cross-site scripting (XSS), SQL injection, CSRF (Cross-Site Request Forgery), SSRF (Server-Side Request Forgery), LFI (Local File Inclusion) and RFI (Remote File Inclusion).
Ways to run the program:
you can start the program by ./code sentinel, in addition to starting the program normally, it is also possible to install the program's dependencies.
Or if you want to start the program right away, you can run the file sentinel.py
make sure you are in the files directory when executing any of the files.
[Pedro - boloto1979] [CodeSentinel]
This discussion was created from the release CodeSentinel - vulnerability analyzer.
Beta Was this translation helpful? Give feedback.
All reactions