openappsec / waf-comparison-projectLinks
Testing datasets and tools to compare WAF efficacy
☆184Updated 7 months ago
Alternatives and similar repositories for waf-comparison-project
Users that are interested in waf-comparison-project are comparing it to the libraries listed below
Sorting:
- DevSecOpsGuides☆192Updated 6 months ago
- A full insecure kubernetes application for testing security tools☆89Updated last week
- Repo to hold wazuh manager mcp server☆64Updated last month
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆289Updated last year
- Curating Falco rules with MITRE ATT&CK Matrix☆84Updated last year
- Curated list of security tools☆68Updated last year
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆176Updated this week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆263Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆677Updated 3 weeks ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆96Updated 2 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆317Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆211Updated last week
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆97Updated 5 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆189Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.☆397Updated 2 years ago
- cloudgrep is grep for cloud storage☆325Updated 8 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆257Updated 3 months ago
- OWASP Foundation Web Respository☆99Updated 3 weeks ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 10 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated 3 weeks ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 11 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆74Updated 3 weeks ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆171Updated this week
- Generate datasets of cloud audit logs for common attacks☆221Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆467Updated 4 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆254Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- A list of cloud security tools and vendors.☆180Updated last year