spartancyberultron / WAF-CopilotLinks
ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vulnerability assessment process via AI engines, CVE data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface.
☆21Updated 2 months ago
Alternatives and similar repositories for WAF-Copilot
Users that are interested in WAF-Copilot are comparing it to the libraries listed below
Sorting:
- Web Server Vulnerability Scanning Tool☆36Updated 9 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Updated last month
- BlueSky OSINT Tool☆14Updated last year
- ☆22Updated 9 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Updated 2 months ago
- Security tool against dependency typosquatting attacks☆54Updated this week
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- An OpenAI API Compatible Honeypot Gateway☆17Updated 9 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated 4 months ago
- ☆98Updated 4 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆68Updated 3 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated 4 months ago
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated 3 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- ☆75Updated 9 months ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆96Updated last month
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated 2 weeks ago
- Detect drift. Defend cloud.☆35Updated 5 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆77Updated 3 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago
- ☆31Updated 2 weeks ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated last month
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 7 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- The Jolly Executioner - a simple command execution proxy☆16Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆73Updated 8 months ago