sudeshnapal12 / Web-Application-FirewallLinks
Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop malicious requests from known attacks such as SQL Injection, XSS attacks and from unknown attacks by learning the legitimate traffic.
☆16Updated 8 years ago
Alternatives and similar repositories for Web-Application-Firewall
Users that are interested in Web-Application-Firewall are comparing it to the libraries listed below
Sorting:
- Industrial Security Checklist☆10Updated 8 years ago
- Vipasyin Webshell detector (golang)☆8Updated 10 years ago
- passive dns collector☆10Updated 8 years ago
- 一个简单的NIDS系统☆15Updated 8 years ago
- IronBee Rules☆18Updated 11 years ago
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- ☆14Updated 7 years ago
- ☆13Updated 2 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- check cmd execute☆13Updated 8 years ago
- Web scan foundation framework☆23Updated 7 years ago
- LFI scan, exploit tool☆13Updated 10 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated 2 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Updated 5 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- web Log Forensics☆9Updated 10 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Updated 6 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- 针对PHP网马的正则查杀☆12Updated 7 years ago
- Automatic detection of security holes☆8Updated 2 years ago
- Github Desktop RCE PoC☆28Updated 6 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Snort rules☆35Updated 6 years ago
- Struts2 S2-045-Nmap NSE script☆51Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Utilities for creating Burp Suite Extensions.☆21Updated 7 months ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- security course list☆14Updated 9 years ago