All Projects → jvoisin → Snuffleupagus

jvoisin / Snuffleupagus

Licence: lgpl-3.0
Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest!

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Snuffleupagus

Windows10 hardening
My Windows 10 x64 security hardening guide
Stars: ✭ 78 (-84.68%)
Mutual labels:  security-hardening, hardening
Hardentheworld
Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-68.96%)
Mutual labels:  security-hardening, hardening
Content
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+139.49%)
Mutual labels:  security-hardening, hardening
Hardening
Hardening Ubuntu. Systemd edition.
Stars: ✭ 705 (+38.51%)
Mutual labels:  security-hardening, hardening
Windows11 Hardening
My Windows 11 x64 security hardening guide
Stars: ✭ 267 (-47.54%)
Mutual labels:  hardening, security-hardening
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+1695.09%)
Mutual labels:  security-hardening, hardening
How To Secure A Linux Server
An evolving how-to guide for securing a Linux server.
Stars: ✭ 11,939 (+2245.58%)
Mutual labels:  security-hardening, hardening
Stronghold
Easily configure macOS security settings from the terminal.
Stars: ✭ 813 (+59.72%)
Mutual labels:  security-hardening, hardening
nim-contra
Lightweight Self-Documenting Design by Contract Programming and Security Hardened mode.
Stars: ✭ 46 (-90.96%)
Mutual labels:  hardening, security-hardening
prowler
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+1480.75%)
Mutual labels:  hardening, security-hardening
Terraform Aws Secure Baseline
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
Stars: ✭ 596 (+17.09%)
Mutual labels:  security-hardening, hardening
Jshielder
Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark
Stars: ✭ 483 (-5.11%)
Mutual labels:  security-hardening, hardening
Windows 10 Hardening
Windows 10 hardening guide without gimmicks
Stars: ✭ 102 (-79.96%)
Mutual labels:  security-hardening, hardening
Ansible Role Hardening
Ansible role to apply a security baseline. Systemd edition.
Stars: ✭ 188 (-63.06%)
Mutual labels:  security-hardening, hardening
terraform-aws-secure-vpc
A terraform module to create a VPC with secure default configurations.
Stars: ✭ 13 (-97.45%)
Mutual labels:  hardening, security-hardening
Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+796.07%)
Mutual labels:  security-hardening, hardening
Wazuh Ruleset
Wazuh - Ruleset
Stars: ✭ 305 (-40.08%)
Mutual labels:  security-hardening
Quick Secure
Quickly secure UNIX/Linux systems
Stars: ✭ 379 (-25.54%)
Mutual labels:  security-hardening
Aws Gate
Better AWS SSM Session manager CLI client
Stars: ✭ 294 (-42.24%)
Mutual labels:  hardening
Serialkiller
Look-Ahead Java Deserialization Library
Stars: ✭ 277 (-45.58%)
Mutual labels:  security-hardening


Snuffleupagus' logo
Snuffleupagus

Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest!

github actions testing _all_ distributions github actions testing _all_ php versions Coverity CII Best Practises readthedocs.org coveralls twitter Packaging status

Key FeaturesDownloadExamplesDocumentationLicenseThanks

Snuffleupagus is a PHP 7+ and 8+ module designed to drastically raise the cost of attacks against websites, by killing entire bug classes. It also provides a powerful virtual-patching system, allowing administrator to fix specific vulnerabilities and audit suspicious behaviours without having to touch the PHP code.

Key Features

  • No noticeable performance impact
  • Powerful yet simple to write virtual-patching rules
  • Killing several classes of vulnerabilities
  • Several hardening features
    • Automatic secure and samesite flag for cookies
    • Bundled set of rules to detect post-compromissions behaviours
    • Global strict mode and type-juggling prevention
    • Whitelisting of stream wrappers
    • Preventing writeable files execution
    • Whitelist/blacklist for eval
    • Enforcing TLS certificate validation when using curl
    • Request dumping capability
  • A relatively sane code base:

Download

We've got a download page, where you can find packages for your distribution, but you can of course just git clone this repo, or check the releases on github.

Examples

We're providing various example rules, that are looking like this:

# Harden the `chmod` function
sp.disable_function.function("chmod").param("mode").value_r("^[0-9]{2}[67]$").drop();

# Mitigate command injection in `system`
sp.disable_function.function("system").param("command").value_r("[$|;&`\\n]").drop();

Upon violation of a rule, you should see lines like this in your logs:

[snuffleupagus][0.0.0.0][disabled_function][drop] The execution has been aborted in /var/www/index.php:2, because the return value (0) of the function 'strpos' matched a rule.

Documentation

We've got a comprehensive website with all the documentation that you could possibly wish for. You can of course build it yourself.

Thanks

Many thanks to the Suhosin project for being a huge source of inspiration, and to all our contributors.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].