A Powerfull Django plugin to detect and logging Basic Web-based Attack.
Project description
django_soc_lite
- A security middleware for Django app to Detect OWASP Top Basic and generate report in your ThreatEquation dashboard.
with pip
pip install django_soc_lite
Configure to Your APP
=================
. Add `django_soc_lite` to your project's `INSTALLED_APPS` in`settings.py` file.
. Add the following middleware to your project's `MIDDLEWARE_CLASSES` in `settings.py` file:
``'django_soc_lite.threat.middleware.ThreatEquationMiddleware',``
Include your Product_key and Api_key (without this step, AppSoc won't work)
=================
. in your `settings.py` file place your keys in anywhere.
THREAT_EQUATION_PRODUCT_KEY = <your product_id>
THREAT_EQUATION_API_KEY = <your api_key>
. example-
THREAT_EQUATION_PRODUCT_KEY = 'aaaaabbbbb'
THREAT_EQUATION_API_KEY = '1111111111999999999999xxxxxxxxxxxxxxxxx'
Features
Monitoring request data and generate reports on following areas -
- SQL injection
- XSS (Cross Site Scripting)
- Insecure File/Directory Access
Who do I talk to?
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
django_soc_lite-0.0.2.tar.gz
(8.5 kB
view hashes)
Built Distribution
Close
Hashes for django_soc_lite-0.0.2-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | c1013cf362529845719bd53b03b63857ccc8aa17fc82c0dfb59870849b5147ae |
|
MD5 | e935030908cad613359c70f6d95c06de |
|
BLAKE2b-256 | 74415b8ec1be4d7bc086d785be7d9914fffdb7c55cb1123f8a2e14587de2de63 |