corazawaf / coraza-server
Whitepaper for the coraza-server implementation
☆11Updated 3 years ago
Alternatives and similar repositories for coraza-server:
Users that are interested in coraza-server are comparing it to the libraries listed below
- This is a WIP☆15Updated 3 years ago
- Naxsi for Apache2☆13Updated 5 years ago
- Testing datasets and tools to compare WAF efficacy☆168Updated 2 weeks ago
- Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark (http…☆13Updated 8 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆109Updated 2 months ago
- This web based application enables developers to quickly unit test individual API calls for both Incapsula and SecureSphere, as well as p…☆19Updated last year
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Framework for Testing WAFs (FTW!)☆128Updated 10 months ago
- CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your…☆101Updated 3 years ago
- OPNids GUI, API and systems backend☆34Updated 5 years ago
- Security Intelligence Automation Platform☆19Updated last week
- OWASP Top 10 Infrastructure Security Risks☆34Updated 2 months ago
- cis_pdf_parser.py is a python script for parsing CIS Benchmark PDF files from the Center for Internet Security into CSV files.☆25Updated last year
- OwlH Master API☆24Updated 10 months ago
- Identify IP addresses owned by public cloud providers☆119Updated 9 months ago
- Sample scan files for testing DefectDojo imports☆77Updated 2 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 6 months ago
- OWASP Threat Dragon core files☆28Updated 3 years ago
- ☆100Updated this week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 9 months ago
- The official ModSecurity Docker images☆134Updated 2 years ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆109Updated 11 months ago
- ModSecurity v3 Apache Connector☆92Updated 3 years ago
- ☆23Updated 5 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- Generic ASM Vulnerability Schema XSLT☆11Updated 6 years ago
- Controls Assessment Specification☆69Updated last week
- Greenbone Vulnerability Management Containers☆88Updated last year
- the IoT and OT (Operational Technology) Honeypot☆23Updated last year