migolovanov / modsecurity-checkerLinks
Script to check ModSecurity rules agains some WAF
☆12Updated 7 years ago
Alternatives and similar repositories for modsecurity-checker
Users that are interested in modsecurity-checker are comparing it to the libraries listed below
Sorting:
- A Passive SSH back-end and scanner.☆104Updated 5 months ago
- A parser for the SecRules Langue☆22Updated last week
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Updated last month
- Framework for Testing WAFs (FTW!)☆134Updated last year
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated 2 years ago
- egrets monitors egress☆46Updated 5 years ago
- Command line utility for parsing certificates☆66Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆22Updated 4 years ago
- experimental threat modeling tools☆14Updated 3 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Some resources to facilitate my blog on auditd for security monitoring☆13Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- The only open-source tool to analyze vulnerabilities and configuration issues with running docker container(s) and docker networks.☆126Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆20Updated 4 years ago
- Faraday's Command Line Interface☆51Updated 3 months ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Updated last week
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆105Updated 2 weeks ago
- Centralized IP reputation daemon☆59Updated last year