To contribute your work to the project you need to create a pull request on the Github where it is hosted.
The pull request should contain all needed information – such as an exploit itself, exploit prerequisites, exploit YAML profile if needed hardware profile, hardware prerequisites and if possible needed hardware verification code.
The pull request would be inspected for possible malicious actions and then merged and added to the installation VM.
There are 5 possible codes for non-DoS exploits:
These codes translate into the following wrapper functions that you can import into your exploit code or wrapper:
from bluekit.report import report_vulnerable, report_not_vulnerable, report_error, report_undefined, report_none_of_4_state_observed
In all functions “data” argument represents the data that would appear in the report and logs.
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…