Piyush-2975 / Advanced-WAF-WAFinityView external linksLinks
An Advanced Web Application Firewall that protects against threats like SQL injection and XSS by filtering HTTP traffic. It combines signature-based detection and machine learning-based anomaly detection to identify obfuscated, zero-day, and unknown attacks through behavioral analysis.
☆47May 2, 2025Updated 9 months ago
Alternatives and similar repositories for Advanced-WAF-WAFinity
Users that are interested in Advanced-WAF-WAFinity are comparing it to the libraries listed below
Sorting:
- Basic tool for Information Gathering 🚀☆23Mar 26, 2024Updated last year
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆73Jan 3, 2026Updated last month
- ☆13Sep 28, 2024Updated last year
- Bat Script to collect system and network information from Windows machines without external agents. Ideal for vulnerability assessment an…☆11Jan 27, 2025Updated last year
- ☆11Jan 31, 2025Updated last year
- Welcome to my Cybersecurity Homelab, where I experiment with ethical hacking, penetration testing, network security, AI Agent automation …☆17Mar 11, 2025Updated 11 months ago
- Flakestorm — Automated Robustness Testing for AI Agents. Stop guessing if your agent really works. FlakeStorm generates adversarial mutat…☆33Jan 16, 2026Updated 3 weeks ago
- A Solution Accelerator bringing together the latest AI agentic patterns and Azure services to automate the first line of review for docum…☆23Jan 17, 2025Updated last year
- ☆17Jan 21, 2025Updated last year
- ☆15Jun 8, 2024Updated last year
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated last year
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆56Nov 2, 2023Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- ☆24Feb 4, 2026Updated last week
- A simple python based Key-Logger project in Cyber Security☆39Jan 30, 2025Updated last year
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆22Sep 23, 2024Updated last year
- Push Notification System for ASP.NET Boilerplate☆17Oct 31, 2021Updated 4 years ago
- ☆23Aug 25, 2024Updated last year
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 5 months ago
- ☆28Jan 16, 2025Updated last year
- RMS (Robot Management System)☆28Jul 10, 2016Updated 9 years ago
- Yet another straw to consume Frappe, for React☆23Jun 19, 2025Updated 7 months ago
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆54Sep 10, 2024Updated last year
- ☆30Oct 31, 2025Updated 3 months ago
- This tool allows you to search ArXiv for scientific papers, extract their content, embed and chunk the text, and ask questions about them…☆32Jul 12, 2024Updated last year
- ☆41Mar 23, 2025Updated 10 months ago
- MQTT5 Explorer is a simple yet feature-rich client to visualize data of any MQTT broker.☆50Aug 21, 2025Updated 5 months ago
- MCP Server for YOK Atlas☆57Jan 8, 2026Updated last month
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Feb 19, 2021Updated 4 years ago
- It is a advanced keylogger.☆74Jul 2, 2024Updated last year
- Parse and analyze a Windows Amcache.hve registry hive, VirusTotal integration.☆110Aug 12, 2025Updated 6 months ago
- Reusable core module for React apps with hooks, auth, and services☆70May 22, 2025Updated 8 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆279Jan 23, 2024Updated 2 years ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆93Nov 2, 2023Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆135Feb 3, 2026Updated last week
- 5 Google Custom Search Engines for searching in 48 pastebin sites☆139Mar 25, 2024Updated last year
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆751Feb 3, 2026Updated last week
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆165Nov 29, 2024Updated last year
- 60 Cybersecurity Projects | Certification Roadmaps |Everything you need to build your cybersecurity portfolio☆313Updated this week