CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.
☆15Jun 9, 2021Updated 4 years ago
Alternatives and similar repositories for pixi-crs
Users that are interested in pixi-crs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Security Summit 2018☆29Nov 16, 2020Updated 5 years ago
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- Run unit-tests with Golang testing on your Azure policies☆14Jun 30, 2022Updated 3 years ago
- Performing secure code review with LLMs (and vibe coding IDEs)☆36Aug 5, 2025Updated 7 months ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆17Feb 25, 2025Updated last year
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- Node.js binding for libModSecurity (aka ModSecurity v3)☆14Oct 28, 2017Updated 8 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Python version of OWASP's DirBuster Application.☆29Dec 18, 2014Updated 11 years ago
- MCP Server Security Standard (MSSS): an open, testable security control standard for certifying MCP servers, with levels, evidence requir…☆69Mar 12, 2026Updated last week
- ☆16May 26, 2023Updated 2 years ago
- ☆16Mar 7, 2026Updated 2 weeks ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Mar 17, 2026Updated last week
- The ModSecurity Pcap Connector☆27Jan 13, 2016Updated 10 years ago
- An insecure example application (Java)☆33Aug 19, 2025Updated 7 months ago
- A chrome extension which blocks downloads based on their file extension / origin. Can be used to prevent HTML Smuggling attacks.☆18Mar 2, 2025Updated last year
- A bot to remind you to check whether your Definition-of-Done has been satisfied before approving a pull request☆20Feb 22, 2024Updated 2 years ago
- ECED440 Computer Security☆11Mar 17, 2026Updated last week
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- A documentation generator for NASL.☆18May 31, 2022Updated 3 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Open-source script to split exported ChatGPT conversations into separate JSON files, helping users manually migrate chats from one ChatGP…☆43Feb 10, 2025Updated last year
- A client for Hashicorp Vault written in TypeScript☆14Nov 20, 2023Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Malware Detection Suite for Magento☆20Sep 19, 2017Updated 8 years ago
- Add health endpoints to your applications☆13Nov 15, 2019Updated 6 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- GSM Sniffer☆39Oct 16, 2011Updated 14 years ago
- ☆48Dec 23, 2020Updated 5 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago