- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 28 for jwttool (0.27 sec)
-
tests/integration/security/fuzz/fuzzers/jwt_tool/jwt_tool.yaml
# limitations under the License. apiVersion: apps/v1 kind: Deployment metadata: name: jwttool spec: selector: matchLabels: app: jwttool template: metadata: labels: app: jwttool spec: containers: - name: jwttool
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 21 20:06:01 UTC 2021 - 852 bytes - Viewed (0) -
tests/integration/security/fuzz/fuzz_test.go
pods, err := t.Clusters().Default().PodsForSelector(context.TODO(), ns, "app="+jwtTool) if err != nil { t.Fatalf("failed to get jwttool pod: %v", err) } t.Logf("running jwttool fuzz test against the %s (should normally complete in 10 seconds)...", server) // Run the jwttool fuzz testing with "--mode at" to run all tests: // - JWT Attack Playbook // - Fuzz existing claims to force errors
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 12.9K bytes - Viewed (0) -
tests/integration/security/fuzz/fuzzers/jwt_tool/Makefile
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. HUB ?= "gcr.io/istio-testing/jwttool" TAG ?= "0.1" push: Dockerfile docker build . -t $(HUB):$(TAG)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 21 20:06:01 UTC 2021 - 701 bytes - Viewed (0) -
tests/integration/security/fuzz/fuzzers/jwt_tool/Dockerfile
FROM python:3 RUN git clone https://github.com/ticarpi/jwt_tool WORKDIR /jwt_tool COPY run.sh . COPY jwtconf.ini . COPY sample-RSA-private.pem . COPY sample-RSA-public.pem . RUN chmod +x ./run.sh && chmod +x jwt_tool.py && apt-get update && apt-get install --no-install-recommends -y python3-pip \ && apt-get clean && rm -rf /var/lib/apt/lists/* RUN python3 -m pip install --no-cache-dir termcolor==1.1.0 cprint==1.2.2 pycryptodomex==3.10.1 requests==2.25.1
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 21 20:06:01 UTC 2021 - 485 bytes - Viewed (0) -
tests/integration/security/fuzz/fuzzers/jwt_tool/run.sh
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. ./jwt_tool.py "$@" # The jwt_tool.py always return non-zero exit code, overwrite to just return zero as the test code will check the report # separately to determine if it has really failed.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 21 20:06:01 UTC 2021 - 783 bytes - Viewed (0) -
platforms/native/platform-native/src/main/java/org/gradle/nativeplatform/toolchain/internal/gcc/GccPlatformToolProvider.java
return toolSearchPath.locate(compilerType, toolRegistry.getTool(compilerType).getExecutable()); } @Override protected Compiler<CppCompileSpec> createCppCompiler() { GccCommandLineToolConfigurationInternal cppCompilerTool = toolRegistry.getTool(ToolType.CPP_COMPILER);
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Thu Nov 16 20:20:03 UTC 2023 - 16.1K bytes - Viewed (0) -
src/cmd/go/internal/vet/vetflag.go
// implementation. It is also used by tests. // // The default behavior (vetTool=="") runs 'go tool vet'. var vetTool string // -vettool func init() { work.AddBuildFlags(CmdVet, work.DefaultBuildFlags) CmdVet.Flag.StringVar(&vetTool, "vettool", "", "") } func parseVettoolFlag(args []string) { // Extract -vettool by ad hoc flag processing: // its value is needed even before we can declare
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Dec 19 14:42:39 UTC 2023 - 5.1K bytes - Viewed (0) -
tests/integration/security/fuzz/README.md
before each new Istio release and make sure all fuzz tests pass. ## Overview ![](overview.jpg) The fuzz test uses specialized web vulnerability fuzzers ([jwt_tool](https://github.com/ticarpi/jwt_tool), [dotdotpwn](https://github.com/wireghoul/dotdotpwn)) and [wfuzz](https://github.com/xmendez/wfuzz) to generate a
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jul 09 02:34:11 UTC 2021 - 2.3K bytes - Viewed (0) -
src/cmd/go/internal/vet/vet.go
defer span.Done() work.BuildInit() work.VetFlags = vetFlags if len(vetFlags) > 0 { work.VetExplicit = true } if vetTool != "" { var err error work.VetTool, err = filepath.Abs(vetTool) if err != nil { base.Fatalf("%v", err) } } pkgOpts := load.PackageOpts{ModResolveTests: true} pkgs := load.PackagesAndErrors(ctx, pkgOpts, pkgArgs)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 06 19:23:42 UTC 2023 - 3.2K bytes - Viewed (0) -
tests/integration/security/fuzz/fuzzers/jwt_tool/jwtconf.ini
jwksloc = # Set this to the base URL of a Collaborator server, somewhere you can read live logs, a Request Bin etc. httplistener = [customising] useragent = Mozilla/5.0 (Windows NT 10.0; Win64; x64) jwt_tool [input] wordlist = jwt-common.txt commonHeaders = common-headers.txt commonPayloads = common-payloads.txt [argvals] # Set at runtime - changes here are ignored sigType = targetUrl = cookies =
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 21 20:06:01 UTC 2021 - 1.1K bytes - Viewed (0)