immuniweb/iwtools

By immuniweb

Updated over 2 years ago

Simple CLI interface to leverage ImmuniWeb® Community Edition free tools in CI/CD pipelines & DevOps

Image
0

1.0K

immuniweb/iwtools repository overview

iwtools — ImmuniWeb® Community Edition CLI

Simple CLI interface to leverage ImmuniWeb® Community Edition free tools in CI/CD pipelines and DevOps.

Usage

Cloud Security Test

Check your cloud security and exposure of unprotected or misconfigured cloud storage in more than 20 cloud storage providers:

docker run immuniweb/iwtools cloud example.com
Main features:
  • Detect Unprotected Cloud Storage
  • Discover Shadow Cloud Accounts
  • Detect IAM Misconfigurations
  • Prevent Data Leaks and Breaches
Email Security Test

Check your email server for misconfigurations or vulnerabilities:

docker run immuniweb/iwtools email immuniweb.com
Main features:
  • Email Server Security
  • Email Server Encryption
  • DNS Misconfigurations
  • Blacklists & Spam Reports
  • Compromised Credentials
  • Phishing Campaigns
Website Security Test

Check your website for GDPR and PCI DSS compliance, test CMS and CSP security, verify web server hardening and privacy:

docker run immuniweb/iwtools websec https://www.immuniweb.com
Main features:
  • GDPR & PCI DSS Test
  • Website CMS Security Test
  • CSP & HTTP Headers Check
  • WordPress & Drupal Scanning
Mobile App Security Test

Audit your iOS or Android apps for OWASP Mobile Top 10 and other vulnerabilities:

Local mobile app check:

docker run --volume /{path-to-your-app}/:/app/myapp/ immuniweb/iwtools mobile /app/myapp/myapp.apk

Remote mobile app check:

docker run immuniweb/iwtools mobile https://example.com/download/myapp.apk

Published mobile app check:

docker run immuniweb/iwtools mobile https://play.google.com/store/apps/details?id=com.app.my
Main features:
  • iOS/Android Security Test
  • OWASP Mobile Top 10 Test
  • Mobile App Privacy Check
  • Mobile Security Scan
Dark Web Exposure Test

Monitor and detect your Dark Web exposure, phishing and domain squatting:

docker run immuniweb/iwtools darkweb www.immuniweb.com
Main features:
  • Dark Web Exposure Monitoring
  • Phishing Detection and Monitoring
  • Domain Squatting Monitoring
  • Trademark Infringement Monitoring
SSL Security Test

Test your servers for security and compliance with PCI DSS, HIPAA & NIST:

Web Server check:

docker run immuniweb/iwtools ssl immuniweb.com:443

Mail Server check:

docker run immuniweb/iwtools ssl immuniweb.com:25
Main features:
  • Web Server SSL Test
  • Email Server SSL Test
  • SSL Certificate Test
  • PCI DSS, HIPAA & NIST Test

Utilization in CI/CD

When executing the script you can specify option -p or --pipeline parameter, which will compare the results of the test with pre-determined results in a configuration file. This can be done only when using email, websec and ssl services. The result of the comparison can be viewed in the Exit Code of the script.

docker run immuniweb/iwtools email immuniweb.com -p
docker run immuniweb/iwtools websec https://www.immuniweb.com -p
docker run immuniweb/iwtools ssl www.immuniweb.com:443 -p

In order to use a custom configuration file, you need to mount volume, which will contain the new file. If the name of the configuration file is different from the default config/email.yaml, config/websec.yaml or config/ssl.yaml ones, then you need to specify the new name via the -cfg config/{new-file-name} parameter.

docker run --volume /{path-to-config}/:/app/config/ immuniweb/iwtools websec https://www.immuniweb.com -p -cfg config/websec-new.yaml

Curretly only yaml and json formats are supported. List of parameters that can be configured.

The docker's Exit Code can return one of these 4 status codes:

  • 0 - all checks have passed successfully.
  • 1 - an error occured.
  • 2 - an error occured in the input data.
  • 3 - at least one of the checks has failed.
API key's utilization

The API key can be prepared for using upon Docker's launch via the --api-key API_KEY parameter, or by mounting volume, which will contain a file with the key. In this case, you will need to use --api-keyfile API_KEYFILE parameter.

 docker run --volume /{path-to-key-folder}/:/app/config/ immuniweb/iwtools websec https://www.immuniweb.com -p -r --api-keyfile config/api-key.txt

Command line options: documentation Read more: ImmuniWeb® Community Edition

This software is provided "as is" without any warranty of any kind. By using this software you agree to the Terms of Service: https://www.immuniweb.com/pages/legal.html By using this software you accept the Privacy Policy: https://www.immuniweb.com/pages/privacy.html

Tag summary

Content type

Image

Digest

sha256:bd18c91d3

Size

30.4 MB

Last updated

over 2 years ago

Requires Docker Desktop 4.37.1 or later.