SpiderLabs / modsec-sdbm-util
Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to list the SDBM contents with filters such as: expired or invalid items only.
☆22Updated 5 months ago
Alternatives and similar repositories for modsec-sdbm-util:
Users that are interested in modsec-sdbm-util are comparing it to the libraries listed below
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆21Updated 7 years ago
- System Status Probe☆21Updated 7 years ago
- Set of Python scripts to perform SecRules language evaluation on a given http request.☆13Updated 7 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆16Updated 2 months ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆65Updated 13 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- ModSecurity status☆34Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- recon framework in ruby☆13Updated 13 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆11Updated 11 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 10 years ago
- Ruby API client for the Censys internet-wide network-scan search engine☆9Updated 4 months ago
- A DOM-Inspired Ruby Smart Fuzzer☆13Updated 14 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆41Updated 14 years ago
- The Rex Socket Abstraction Library☆12Updated last month
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Updated 8 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 11 years ago
- A Ruby interface to sslyze python utility.☆13Updated last year
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 8 years ago
- Universal stack-based buffer overfow exploitation tool☆22Updated 10 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Updated 5 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- The ModSecurity Pcap Connector☆26Updated 9 years ago