Preflight Logo

Preflight

0
Free
Visit Website

Preflight helps you verify scripts and executables to mitigate chain of supply attacks such as the recent Codecov hack. First of all, it's the chicken and the egg. How do you pull a legit preflight binary from us without verifying it with preflight? The best way is to grab the source, compile it yourself, and use your own binary which you put in a place that you trust. People usually have several options of how to do that safely: Put it on your own S3 bucket, Drop it on your own Artifactory or similar, Push it directly into your repos (it should be as small as 4mb and almost never change so Git should work nicely with it), Build from source into your containers directly: FROM golang:1.16-alpine AS preflight_builder RUN apk add --no-cache git WORKDIR /builds RUN GOBIN=`pwd` go get -u github.com/spectralops/preflight # Build from a bare image, copy built binary FROM alpine:3.9 RUN apk add ca-certificates COPY --from=preflight_builder /builds/preflight /usr/local/bin # use preflight as you wish RUN curl https://.. |

FEATURES

ALTERNATIVES

FSquaDRA is a tool for detection of repackaged Android applications based on Jaccard similarity computation over digests of files.

King Phisher is a phishing campaign toolkit for testing and promoting user awareness through simulated attacks.

A novel genetic algorithm for automating censorship evasion strategies.

A spam prevention technique using hidden fields to detect and deter spam bots in Laravel applications.

Catch possible phishing domains in near real time by looking for suspicious TLS certificate issuances reported to the Certificate Transparency Log (CTL) via the CertStream API.

Steghide is a steganography program for hiding data in image and audio files.

A cross-platform software library for interacting with iOS devices without jailbreaking.

iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved