Tufin / Pytos
Licence: apache-2.0
A Python SDK for Tufin Orchestration Suite
Stars: ✭ 49
Programming Languages
python
139335 projects - #7 most used programming language
Labels
Projects that are alternatives of or similar to Pytos
gcp-firewall-enforcer
A toolbox to enforce firewall rules across multiple GCP projects.
Stars: ✭ 77 (+57.14%)
Mutual labels: security-audit, firewall
Docker Host
A docker sidecar container to forward all traffic to local docker host or any other host
Stars: ✭ 769 (+1469.39%)
Mutual labels: firewall
Ossa
Open-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+1524.49%)
Mutual labels: security-audit
Ufw Docker
To fix the Docker and UFW security flaw without disabling iptables
Stars: ✭ 878 (+1691.84%)
Mutual labels: firewall
Spoilerwall
Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (+1438.78%)
Mutual labels: firewall
Arbitrium Rat
Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules
Stars: ✭ 938 (+1814.29%)
Mutual labels: firewall
S3 Permission Checker
Check read, write permissions on S3 buckets in your account
Stars: ✭ 18 (-63.27%)
Mutual labels: security-audit
Sn0int
Semi-automatic OSINT framework and package manager
Stars: ✭ 814 (+1561.22%)
Mutual labels: security-audit
Sipcheck
SIPCheck is a tool that watch the authentication of users of Asterisk and bans automatically if some user (or bot) try to register o make calls using wrong passwords.
Stars: ✭ 20 (-59.18%)
Mutual labels: firewall
Dsinternals
Directory Services Internals (DSInternals) PowerShell Module and Framework
Stars: ✭ 776 (+1483.67%)
Mutual labels: security-audit
Repo Security Scanner
CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys
Stars: ✭ 977 (+1893.88%)
Mutual labels: security-audit
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+1465.31%)
Mutual labels: security-audit
Marsnake
System Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-67.35%)
Mutual labels: security-audit
Wordpress Exploit Framework
A Ruby framework designed to aid in the penetration testing of WordPress systems.
Stars: ✭ 882 (+1700%)
Mutual labels: security-audit
Xwaf
xWAF 3.0 - Free Web Application Firewall, Open-Source.
Stars: ✭ 48 (-2.04%)
Mutual labels: firewall
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-24.49%)
Mutual labels: security-audit
Pytos
|Build Status| |Version|
.. |Build Status| image:: https://travis-ci.org/Tufin/pytos.svg?branch=master :target: https://travis-ci.org/Tufin/pytos :alt: Build Status .. |Version| image:: http://img.shields.io/pypi/v/pytos.svg?style=flat :target: https://pypi.python.org/pypi/pytos/ :alt: Version
Pytos is the Tufin Orchestration Suite (TOS) Software Development Kit (SDK) for Python, which allows Python developers to make use of the services provided by SecureTrack, SecureChange and SecureApp.
Common Use Cases
- Get security rules or ACLs from firewalls
- Get network objects and services from firewalls
- Get security groups from cloud platforms
- Get routing tables and interfaces from routers and firewalls
- Manage security zones
- Submit and manage access requests to update firewall policies
- Manage application connectivity
Installation
Install the package by running the following command (it is recommended that you upgrade pip first)::
# pip install pytos
Running Tests
The package can be tested in all supported Python versions using ``tox``. The tested Python version
must be installed including ``tox``:
$ tox -e py34
You can also run individual tests with your default Python version by running ``nosetests`` command directly:
$ nosetests -v tests/securetrack_test/test_secure_track_helper_unittest.py:TestGeneralSettings
SecureTrack
***********
Connect to SecureTrack with valid username and password::
from pytos.securetrack.helpers import Secure_Track_Helper
st_helper = Secure_Track_Helper("127.0.0.1", ("username", "password"))
SecureChange
************
Connect to SecureChange with valid username and password::
from pytos.securechange.helpers import Secure_Change_Helper
sc_helper = Secure_Change_Helper("127.0.0.1", ("username", "password"))
SecureApp
*********
Connect to SecureApp with valid username and password::
from pytos.secureapp.helpers import Secure_App_Helper
sa_helper = Secure_App_Helper("127.0.0.1", ("username", "password"))
How to use pytos logger
***********************
To use the pytos logging mechanism perform the following steps:
The following table defines the log levels and messages, in decreasing order of severity.
+---------------------+----------------------------------------------+
| Parameters | Description |
+=====================+==============================================+
| CRITICAL | Only critical messages. |
+---------------------+----------------------------------------------+
| ERROR | Messages with error and above. |
+---------------------+----------------------------------------------+
| WARNING | Message with warning and above. |
+---------------------+----------------------------------------------+
| INFO | Messages with info and above. |
+---------------------+----------------------------------------------+
| DEBUG | All levels. |
+---------------------+----------------------------------------------+
Create an ini like configuration file with the following sections::
[common]
log_file_path = /var/log/pytos/
[log_levels]
common = WARNING
helpers = WARNING
reports = WARNING
requests = WARNING
mail = WARNING
sql = WARNING
xml = WARNING
web = WARNING
third_party = WARNING
In your code call the following methods::
import logging
from pytos.common.logging.Defines import COMMON_LOGGER_NAME
from pytos.common.logging.Logger import setup_loggers
from pytos.common.functions.Config import Secure_Config_Parser
conf = Secure_Config_Parser(config_file_path="/ini/like/configuration/path/pytos.conf")
logger = logging.getLogger(COMMON_LOGGER_NAME)
setup_loggers(conf.dict("log_levels"), log_to_stdout=True)
logger.info("Hello world")
Getting Help
************
For tracking bugs and new feature requests please use GitHub issues. Please also use these community resources for getting
help:
* Join the `Tufin Developer Community <https://plus.google.com/communities/112366353546062524001>`__
* If you think you found a bug, please `submit an issue <https://github.com/Tufin/pytos/issues>`__
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].