SpiderLabs / modsec-sdbm-util
Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to list the SDBM contents with filters such as: expired or invalid items only.
☆22Updated 9 months ago
Alternatives and similar repositories for modsec-sdbm-util
Users that are interested in modsec-sdbm-util are comparing it to the libraries listed below
Sorting:
- ModSecurity status☆34Updated 10 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Updated 7 years ago
- System Status Probe☆21Updated 7 years ago
- Set of Python scripts to perform SecRules language evaluation on a given http request.☆14Updated 7 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆65Updated 13 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated 6 months ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- ☆11Updated 4 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Check for HTTP Security Headers☆13Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Python bindings for libModSecurity (aka ModSecurity v3)☆25Updated 6 years ago
- 🦑 A friendly Ruby API to iptables.☆15Updated 8 years ago
- recon framework in ruby☆13Updated 13 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- A passive network discovery tool that finds live network nodes by analyzing ARP and broadcast packets.☆12Updated 12 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago