<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>github on Asa&#39;s Website</title><link>https://ahessmat.netlify.com/tags/github/</link><description>Recent content in github on Asa&#39;s Website</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 19 Apr 2021 20:19:34 +0000</lastBuildDate><atom:link href="https://ahessmat.netlify.com/tags/github/index.xml" rel="self" type="application/rss+xml"/><item><title>April 2021 Check-In</title><link>https://ahessmat.netlify.com/post/2021-04-april-2021-check-in/</link><pubDate>Mon, 19 Apr 2021 20:19:34 +0000</pubDate><guid>https://ahessmat.netlify.com/post/2021-04-april-2021-check-in/</guid><description>Preamble This month there were a variety of subjects that caught my eye:
Flawfinder
This month I continued to advance my comprehension in static code analysis by leveraging the Flawfinder command-line tool. In brief, flawfinder searches through C/C++ source code looking for potential security flaws. Any potential vulnerabilities discovered are output to the command line ranked 1 to 5 (with 5 being the most severe). I leveraged this tool recently while working through a binary exploitation problem; while ultimately I&amp;rsquo;d like to develop my own comprehension to recognize these vulnerabilities on my own innately, for now tools like this can help direct and guide me.</description></item></channel></rss>