Git Product home page Git Product logo

codewarrior's Introduction

🏠 About me

  • 👋 Just another programmer
  • 🔭 I’m currently working in repository OctopusWAF.
  • 🌱 I’m currently learning Rust language.
  • 👯 I’m looking to collaborate on open source projects.
  • 💬 Read my git book https://antonio-cooler.gitbook.io/coolervoid-tavern/
  • 📫 How to reach me: coolerlair[ at]gmail[dot ]com
  • Fun fact: I love comics(Roy Thomas, Alan Moore, Frank Miller and Grant Morrison)!
  • Sometimes I play guitar: look here

📈 GitHub Stats

CoolerVoid's github stats

Buy Me A Coffee

codewarrior's People

Contributors

bincker avatar luanjampa avatar mdf092 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

codewarrior's Issues

Run automatically

Hello everyone,
Thanks in advance for this important project, I have a doubt about this tool, if I need to run this tool over a DD, what could be the best practice? is it possible to run it from a script?
PD: my dd has a source code of my application with a lot of folders.

Thanks again...

Stack overflow detector

Software vulnerabilities that result in a stack-based buffer overflow are not as common today as they once were. but it only takes a single known vulnerability in a commonly used piece of software or operating systems to leave an entire infrastructure exposed. Since the release of papers detailing exploitation methods like Mudge’s “How To Write Buffer Overflows” , Aleph One’s “Smashing The Stack For Fun and Profit,” buffer overflows get chunk of problems in the information security field. The past few years has seen volumes of information published on techniques, when you use other tools to make static analysis don't have more precision...

So in this issue, need add stack overflow detector for C language, i think use dlopen() function to load external module, with this way, anyone can implement analyser...

Cannot load SSL cert

With version v061 for Linux, it is not possible to load de SSL certificate.

It has been generated after following the readme file:

cd cert; openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout certkey.key -out certificate.crt
cat certificate.crt certkey.key > certkey.pem 
cd ..
> bin/warrior
Starting SSL server on port 1345, cert from cert/certkey.pem, key from cert/certkey.key

--- DEBUG-START ---

 Thu Aug 19 15:56:52 2021 src/main.c[35] main(): 
Failed to create listener: Invalid SSL key


--- DEBUG-END ---

System versions:

> uname -a
Linux kali 5.10.0-kali5-amd64 #1 SMP Debian 5.10.24-1kali1 (2021-03-23) x86_64 GNU/Linux
> openssl version
OpenSSL 1.1.1j  16 Feb 2021 (Library: OpenSSL 1.1.1k  25 Mar 2021

fatal error: 'openssl/ssl.h' file not found

I'm seeing an error when I try to build CodeWarrior on Mac Mohave.
What do you advise to fix this?

input:
$ make

output:
Compile...
gcc -Wall -Wextra -DMG_ENABLE_SSL -DMG_DISABLE_PFS lib/slre/slre.c lib/libmongoose/mongoose.c lib/sha256/sha256.c lib/BSD/strsec.c lib/frozen/frozen.c -c src/*.c
lib/libmongoose/mongoose.c:4658:10: fatal error: 'openssl/ssl.h' file not found
#include <openssl/ssl.h>
^~~~~~~~~~~~~~~
1 error generated.
make: *** [warrior] Error 1

Missing Main.c file

/Desktop/codewarrior$ make
make: *** No rule to make target 'src/main.c', needed by 'warrior'. Stop.

/Desktop/codewarrior$ ls src/
file_ops.c mem_ops.c string_ops.c validate.c
file_ops.h mem_ops.h string_ops.h validate.h
html_entities.c routes.c token_anti_csrf.c whitelist.c
html_entities.h routes.h token_anti_csrf.h whitelist.h

improve the anti-csrf token

So token with timeout is not necessary, because repeat any times... this loss security...
Change timeout options to use session, each time put diferent token and uses HMAC() function in sha256().

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.