openappsec / waf-comparison-projectLinks
Testing datasets and tools to compare WAF efficacy
☆182Updated 4 months ago
Alternatives and similar repositories for waf-comparison-project
Users that are interested in waf-comparison-project are comparing it to the libraries listed below
Sorting:
- DevSecOpsGuides☆189Updated 4 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆174Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆661Updated 3 weeks ago
- Curating Falco rules with MITRE ATT&CK Matrix☆82Updated last year
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆286Updated 11 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- A full insecure kubernetes application for testing security tools☆89Updated 3 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆301Updated last month
- cloudgrep is grep for cloud storage☆326Updated 5 months ago
- OWASP Foundation Web Respository☆97Updated 6 months ago
- ☆262Updated 8 months ago
- Add a layer of active defense to your cloud applications.☆96Updated this week
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- Gram is Klarna's own threat model diagramming tool☆322Updated 2 weeks ago
- Curated list of security tools☆66Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆440Updated last month
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆534Updated 5 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 7 months ago
- A list of cloud security tools and vendors.☆175Updated 11 months ago
- Generate datasets of cloud audit logs for common attacks☆217Updated last year
- Lambda function that streamlines containment of an AWS account compromise☆346Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆348Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆389Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆69Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆243Updated 3 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆93Updated 2 months ago
- ☆61Updated 2 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆240Updated last month