Just another manual code analysis tool and static analysis tool Codewarrior runs at HTTPd with TLS, uses KISS principle(https://en.wikipedia.org/wiki/KISS_principle)
Video demo: https://youtu.be/tZkllJ9mieU
#Directories:
web/ = local of javascripts and html and css sources
src/ = C source code, this code talking with web socket
eggs/ = external modules to search codes using regex
conf/whitelist.conf = list of IPs that have access in HTTPd server
bin/ = file to execute...
doc/ = at construction...
lib/ = External libraries
cert/ = loads your certificates for TLS here
Don't need install, just compile and run... runs at Linux, BSD and MacOS. need to install openssl-dev or openssl-devel package because need OpenSSL lib.
- git clone ttps://github.com/CoolerVoid/codewarrior/; cd codewarrior
- $ make
Example if you need create your cert...
- $ cd cert; openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout certkey.key -out certificate.crt
- $ cat certificate.crt privateKey.key > certkey.pem
- $ cd ..
Execute don't do "cd bin; ./warrior", follow example:
- $ bin/warrior
Open browser at https://127.0.0.1:1345/index.html (dont write localhost use 127.0.0.1)
#Notes:
- if screen stock you reflesh browser with F5...
- If return error, port already in use... close it with...
- $ fuser -k -n tcp 1345
- If you want use at network, Whitelist to access server you can edit at "config/whitelist.conf".
- Use chrome browser to run.
- Use 127.0.0.1 addr dont use localhost name.
#Tested at path:
https://github.com/joostvanveen/php-security-pitfalls
#Tricks:
- if you want change cert "cert/certpem.pem" generate with openssl cartificate and key and concatenate both...
- all html code and web sockets + javascript code you can view at path "web/"
- if you change the default port you need edit port in web/ at web sockets connection.
#TODO:
- Add external Automatons for each language case
- Add load module with dlopen()
- Add ReDOS validator at regex calls
- Machine learning so try use bag of Words with KNN