Skip to content
This repository was archived by the owner on Oct 14, 2020. It is now read-only.

Commit 00f2c05

Browse files
authored
Merge pull request #73 from secureCodeBox/feature/improve-readme-files
Feature/improve readme files
2 parents b38a73b + 0a287a5 commit 00f2c05

File tree

17 files changed

+116
-15
lines changed

17 files changed

+116
-15
lines changed

hooks/declarative-subsequent-scans/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ path: "hooks/declarative-subsequent-scans"
44
category: "hook"
55
type: "processing"
66
state: "released"
7-
usecase: "Enables cascading Scans based declarative _CascadingRules_."
7+
usecase: "Cascading Scans based declarative Rules."
88
---
99

1010
<!-- end -->
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
title: "DefectDojo"
3+
path: "hooks/persistence-defectdojo"
4+
category: "hook"
5+
type: "persistenceProvider"
6+
state: "roadmap"
7+
usecase: "Publishes all Scan Findings to elasticsearch (ECK)."
8+
---
9+
10+
<!-- end -->
11+
12+
## About
13+
14+
DefectDojo is an OpenSource Tools for importing and managing findings of security scanner. The DefectDojo persistence provider can be used to create new Engagements for SecurityTests run via the secureCodeBox and import all findings which were identified.
15+
16+
Tools which are supported by the secureCodeBox and DefectDojo (OWASP ZAP, Arachni & Nmap) this is done by importing the raw scan report into DefectDojo. Findings by other secureCodeBox supported scanners are currently not directly supported by DefectDojo. These findings are imported via a generic finding api of defectDojo, which might cause some loss of information about the findings.
17+
18+
To learn more about DefectDojo visit [DefectDojo GitHub] or [DefectDojo Website].
19+
20+
## Deployment
21+
The secureCodeBox core team is working on an integration of DefectDojo. We will keep you informed.
22+
23+
24+
[DefectDojo Website]: https://www.defectdojo.org/
25+
[DefectDojo GitHub]: https://github.com/DefectDojo/django-DefectDojo
26+
[DefectDojo Documentation]: https://defectdojo.readthedocs.io/en/latest/

hooks/persistence-elastic/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ path: "hooks/persistence-elastic"
44
category: "hook"
55
type: "persistenceProvider"
66
state: "released"
7-
usecase: "Publishes all Scan Findings to elasticsearch (ECK)."
7+
usecase: "Publishes all Scan Findings to Elasticsearch."
88
---
99

1010
<!-- end -->

hooks/slack-webhook/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: "Slack WebHook"
3+
path: "hooks/slack-webhook"
4+
category: "hook"
5+
type: "integration"
6+
state: "roadmap"
7+
usecase: "Publishes Scan Summary to Slack."
8+
---
9+
10+
<!-- end -->
11+
12+
## Deployment
13+
14+
Installing the Slack WebHook hook will add a ReadOnly Hook to your namespace.
15+
16+
The secureCodeBox core team is working on this, we will keep you informed.

hooks/teams-webhook/README.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: "MS Teams WebHook"
3+
path: "hooks/teams-webhook"
4+
category: "hook"
5+
type: "integration"
6+
state: "roadmap"
7+
usecase: "Publishes Scan Summary to MS Teams."
8+
---
9+
10+
<!-- end -->
11+
12+
## Deployment
13+
14+
Installing the Teams WebHook hook will add a ReadOnly Hook to your namespace.
15+
16+
The secureCodeBox core team is working on this, we will keep you informed.

hooks/update-field/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "Generic WebHook"
3-
path: "hooks/udapte-field"
2+
title: "Update Field"
3+
path: "hooks/update-field"
44
category: "hook"
55
type: "dataProcessing"
66
state: "released"

scanners/amass/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ path: "scanners/amass"
44
category: "scanner"
55
type: "Network"
66
state: "released"
7-
appVersion: 3.7.2
7+
appVersion: "3.7.2"
88
usecase: "Subdomain Enumeration Scanner"
99
---
1010

scanners/kube-hunter/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ path: "scanners/kube-hunter"
44
category: "scanner"
55
type: "Kubernetes"
66
state: "released"
7-
appVersion: 0.3.1
7+
appVersion: "0.3.1"
88
usecase: "Kubernetes Vulnerability Scanner"
99
---
1010

scanners/kubeaudit/README.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: "kubeaudit"
3+
path: "scanners/kubeaudit"
4+
category: "scanner"
5+
type: "Kubernetes"
6+
state: "roadmap"
7+
appVersion: "0.9.0"
8+
usecase: "Audit your Kubernetes clusters"
9+
---
10+
11+
kubeaudit helps you audit your Kubernetes clusters against common security controls.
12+
13+
To learn more about the kubeaudit scanner itself visit [kubeaudit GitHub].
14+
15+
<!-- end -->
16+
17+
## Deployment
18+
The secureCodeBox core team is working on an integration of kubeaudit. We will keep you informed.
19+
20+
[kubeaudit GitHub]: https://github.com/Shopify/kubeaudit
21+
[kubeaudit Documentation]: https://github.com/Shopify/kubeaudit#quick-start

scanners/ncrack/README.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: "Ncrack"
3+
path: "scanners/Ncrack"
4+
category: "scanner"
5+
type: "Authentication"
6+
state: "developing"
7+
appVersion: "0.7"
8+
usecase: "Network authentication bruteforcing"
9+
---
10+
11+
Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that can adapt its behaviour based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts.
12+
13+
To learn more about the Ncrack scanner itself visit [Ncrack GitHub] or [Ncrack Website].
14+
15+
<!-- end -->
16+
17+
## Deployment
18+
The secureCodeBox core team is working on an integration of Ncrack. We will keep you informed.
19+
20+
[Ncrack Website]: https://nmap.org/ncrack/
21+
[Ncrack GitHub]: https://github.com/nmap/ncrack
22+
[Ncrack Documentation]: https://nmap.org/ncrack/man.html

0 commit comments

Comments
 (0)