How to Install and Uninstall regexploit Package on openSuSE Tumbleweed
Last updated: November 08,2024
1. Install "regexploit" package
Please follow the step by step instructions below to install regexploit on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
regexploit
Copied
2. Uninstall "regexploit" package
Learn how to uninstall regexploit on openSuSE Tumbleweed:
$
sudo zypper remove
regexploit
Copied
3. Information about the regexploit package on openSuSE Tumbleweed
Information for package regexploit:
-----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : regexploit
Version : 1.0.0-2.1
Arch : noarch
Vendor : openSUSE
Installed Size : 376.5 KiB
Installed : No
Status : not installed
Source package : regexploit-1.0.0-2.1.src
Upstream URL : https://github.com/doyensec/regexploit
Summary : Find regular expressions vulnerable to ReDoS
Description :
Many default regular expression parsers have unbounded worst-case complexity.
Regex matching may be quick when presented with a matching input string.
However, certain non-matching input strings can make the regular expression
matcher go into crazy backtracking loops and take ages to process. This can
cause denial of service, as the CPU will be stuck trying to match the regex.
This tool is designed to:
* find regular expressions which are vulnerable to ReDoS
* give an example malicious string which will cause catastrophic backtracking
Supports:
- C#
- JavaScript/TypeScript (requires node to be installed)
- JSON
- Python
- YAML
-----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : regexploit
Version : 1.0.0-2.1
Arch : noarch
Vendor : openSUSE
Installed Size : 376.5 KiB
Installed : No
Status : not installed
Source package : regexploit-1.0.0-2.1.src
Upstream URL : https://github.com/doyensec/regexploit
Summary : Find regular expressions vulnerable to ReDoS
Description :
Many default regular expression parsers have unbounded worst-case complexity.
Regex matching may be quick when presented with a matching input string.
However, certain non-matching input strings can make the regular expression
matcher go into crazy backtracking loops and take ages to process. This can
cause denial of service, as the CPU will be stuck trying to match the regex.
This tool is designed to:
* find regular expressions which are vulnerable to ReDoS
* give an example malicious string which will cause catastrophic backtracking
Supports:
- C#
- JavaScript/TypeScript (requires node to be installed)
- JSON
- Python
- YAML