openappsec / waf-comparison-project
Testing datasets and tools to compare WAF efficacy
☆163Updated 2 months ago
Alternatives and similar repositories for waf-comparison-project:
Users that are interested in waf-comparison-project are comparing it to the libraries listed below
- Payloads that can be used for testing web application firewalls☆41Updated 2 years ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆167Updated this week
- open-appsec is a machine learning security engine that preemptively and automatically prevents threats against Web Application & APIs. Th…☆1,080Updated this week
- Halberd : Multi-Cloud Attack Platform☆248Updated 2 weeks ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆137Updated last month
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆410Updated last month
- ☆175Updated 2 months ago
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆101Updated 4 months ago
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- ☆404Updated 2 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆224Updated 2 years ago
- cloudgrep is grep for cloud storage☆324Updated 2 weeks ago
- A full insecure kubernetes application for testing security tools☆66Updated this week
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆77Updated last week
- Generate datasets of cloud audit logs for common attacks☆199Updated 6 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆273Updated 5 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆281Updated 9 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 8 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- A list of cloud security tools and vendors.☆146Updated 5 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆208Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 9 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆222Updated 5 months ago
- ☆255Updated 2 months ago
- Lambda function that streamlines containment of an AWS account compromise☆318Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆85Updated this week
- Add a layer of active defense to your cloud applications.☆89Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆562Updated last week
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆161Updated 9 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆38Updated 5 months ago