A Powerfull Django plugin to detect and logging Basic Web-based Attack.
Project description
django_soc_lite
- A security middleware for Django app to Detect OWASP Top Basic and generate report in your ThreatEquation dashboard.
with pip
pip install django_soc_lite
Configure to Your APP
=================
. Add `django_soc_lite` to your project's `INSTALLED_APPS` in`settings.py` file.
. Add the following middleware to your project's `MIDDLEWARE_CLASSES` in `settings.py` file:
``'django_soc_lite.threat.middleware.ThreatEquationMiddleware',``
Include your Product_key and Api_key (without this step, AppSoc won't work)
=================
. in your `settings.py` file place your keys in anywhere.
THREAT_EQUATION_PRODUCT_KEY = <your product_id>
THREAT_EQUATION_API_KEY = <your api_key>
. example-
THREAT_EQUATION_PRODUCT_KEY = 'aaaaabbbbb'
THREAT_EQUATION_API_KEY = '1111111111999999999999xxxxxxxxxxxxxxxxx'
Features
Monitoring request data and generate reports on following areas -
- SQL injection
- XSS (Cross Site Scripting)
- Insecure File/Directory Access
Who do I talk to?
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
django_soc_lite-0.0.4.tar.gz
(8.4 kB
view hashes)
Built Distribution
Close
Hashes for django_soc_lite-0.0.4-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | ef97c30c1869a545d4b07fbfc1f369dce420a5c01467f1ca2204660cfdec3b21 |
|
MD5 | b37f70bdf0aa47482cd97a6ae8ddcce3 |
|
BLAKE2b-256 | dc10e74ae2fd8969f5808c0a923fd3f40b938a8e6743c7aa2829452eb419f07b |