nbs-system / spikeLinks
A cool web interface to manage rules for naxsi
☆19Updated 8 years ago
Alternatives and similar repositories for spike
Users that are interested in spike are comparing it to the libraries listed below
Sorting:
- Because life is too short to waste your time transforming naxsi logs to rules by hand☆43Updated 7 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- Yet another chatops framework☆46Updated 2 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆30Updated 6 years ago
- Server Shield is a lightweight method of protecting and hardening your Linux server. It is easy to install, hard to mess up, and makes yo…☆173Updated 12 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago
- Python bindings for libModSecurity (aka ModSecurity v3)☆25Updated 6 years ago
- DNS Looking Glass☆76Updated 5 years ago
- Proof of concept for vulnerability management of Docker containers☆16Updated 8 years ago
- This chef cookbook provides security configuration for mysql.☆27Updated this week
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆42Updated 3 weeks ago
- Project infrastructure for FireHOL☆23Updated 4 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- IP address parsing for humans.☆56Updated last year
- Framework and command-line tool to scan SSL enabled services☆36Updated 9 years ago
- REST API test utility☆22Updated 5 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- ☆56Updated 7 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 9 months ago
- The ModSecurity Pcap Connector☆27Updated 9 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- A Python implementation of JOSE☆14Updated 6 years ago
- BGP Hijack Detection☆112Updated 7 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- ☆10Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- python based backdoor software☆17Updated 13 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 10 years ago