Quantcast
Channel: KitPloit - PenTest Tools!
Viewing all articles
Browse latest Browse all 5816

CodeWarrior - Just Another Manual Code Analysis Tool And Static Analysis Tool

$
0
0

Just another manual code analysis tool and static analysis tool Codewarrior runs at HTTPd with TLS, uses KISS principle( https://en.wikipedia.org/wiki/KISS_principle )

Directories:
web/ = local of javascripts and html and css sources
src/ = C source code, this code talking with web socket
eggs/ = external modules to search codes using regex
conf/whitelist.conf = list of IPs that have access in HTTPd server
bin/ = file to execute...
doc/ = at construction...
Don't need install, just compile and run, don't have external libs... runs at Linux, BSD and MacOS.
  • git clone ttps://github.com/CoolerVoid/codewarrior/; cd codewarrior
  • $ make
  • $ cd cert; openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout privateKey.key -out certificate.crt
  • $ cat certificate.crt privateKey.key > certkey.pem
  • $ cd ..
  • $ /bin/warrior
Open browser at https://localhost:1345/index.html

Notes:
  • if screen stock you reflesh browser with F5...
  • If return error, port already in use... close it with...
  • $ fuser -k -n tcp 1345
  • If you want use at network, Whitelist to access server you can edit at "config/whitelist.conf".

Tested at path:
https://github.com/joostvanveen/php-security-pitfalls

Tricks:
  • if you want change cert "cert/certpem.pem" generate with openssl cartificate and key and concatenate both...
  • all html code and web sockets + javascript code you can view at path "web/"
  • if you change the default port you need edit port in web/ at web sockets connection.

TODO:
  • Add external Automatons for each language case
  • Add load module with dlopen()
  • Add ReDOS validator at regex calls
  • Machine learning so try use bag of Words with KNN

Author: CoolerVoid



Viewing all articles
Browse latest Browse all 5816

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>