<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Tool on mytty</title>
    <link>https://mytty.org/tags/tool/</link>
    <description>Recent content in Tool on mytty</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>Except where otherwise noted, content on this site is created by Richard Sammet and&lt;br&gt; licensed under a &lt;a href=http://creativecommons.org/licenses/by/4.0/&gt;Creative Commons Attribution 4.0 International License&lt;/a&gt;.</copyright>
    <lastBuildDate>Sat, 06 Apr 2019 11:32:33 +0000</lastBuildDate>
    
	<atom:link href="https://mytty.org/tags/tool/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>dockerinoz - build containers that won&#39;t haunt you</title>
      <link>https://mytty.org/posts/dockerinoz/</link>
      <pubDate>Sat, 06 Apr 2019 11:32:33 +0000</pubDate>
      
      <guid>https://mytty.org/posts/dockerinoz/</guid>
      <description>&lt;h3 id=&#34;dockerinoz-simple-dockerfile-security-best-practices-verification&#34;&gt;dockerinoz - simple Dockerfile (security) best practices verification&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;dockerinoz&lt;/strong&gt; is a very small and simple tool which allows you to verify the content of Dockerfiles against a given best practice. It&amp;rsquo;s nothing more than a fancy grep using a bit more than just simple regular expressions.
This approach allows for &lt;em&gt;very&lt;/em&gt; quick verifications which is especially important when implementing &lt;strong&gt;dockerinoz&lt;/strong&gt; into your build pipeline. It also makes &lt;strong&gt;dockerinoz&lt;/strong&gt; super easy to modify and extend - especially as the rules are just regular expressions in a json file (rules.json).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>apatf - levenshtein distance in cyber security</title>
      <link>https://mytty.org/posts/apatf/</link>
      <pubDate>Sun, 03 Mar 2019 17:10:26 +0000</pubDate>
      
      <guid>https://mytty.org/posts/apatf/</guid>
      <description>&lt;h3 id=&#34;levenshtein-distance-what&#34;&gt;Levenshtein distance what?&lt;/h3&gt;

&lt;p&gt;If you work or are just interested in cyber security you will have most likely encountered situations in which you would have loved to be able to automatically identify the percentage wise difference of two files or strings. A good example is a login or error page check. Imagine you are fuzzing a web application and you try to differentiate a successful injection from an error page.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>