openappsec / waf-comparison-projectLinks
Testing datasets and tools to compare WAF efficacy
☆191Updated 10 months ago
Alternatives and similar repositories for waf-comparison-project
Users that are interested in waf-comparison-project are comparing it to the libraries listed below
Sorting:
- Curating Falco rules with MITRE ATT&CK Matrix☆86Updated last year
- A full insecure kubernetes application for testing security tools☆90Updated 3 months ago
- DevSecOpsGuides☆191Updated 9 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆402Updated 2 years ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆682Updated 3 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆292Updated last year
- Gram is Klarna's own threat model diagramming tool☆329Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated last week
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆176Updated last month
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated 2 months ago
- Curated list of security tools☆66Updated 2 years ago
- Halberd : Multi-Cloud Agentic Attack Tool☆331Updated 2 weeks ago
- 🧰 Multi Tool Kubernetes Pentest Image☆251Updated 4 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆479Updated 7 months ago
- OWASP Foundation Web Respository☆100Updated last month
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- 🛡️ High-performance WAF & CDN detection tool with effectiveness testing suite. Identify protection layers (Cloudflare, Akamai, AWS) and …☆105Updated this week
- Deep Linux runtime visibility meets Wireshark☆302Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆195Updated 4 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆566Updated 2 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆262Updated 6 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆80Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated 2 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆101Updated 3 weeks ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆459Updated this week
- Add a layer of active defense to your cloud applications.☆102Updated last week