sudeshnapal12 / Web-Application-FirewallLinks
Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop malicious requests from known attacks such as SQL Injection, XSS attacks and from unknown attacks by learning the legitimate traffic.
☆16Updated 9 years ago
Alternatives and similar repositories for Web-Application-Firewall
Users that are interested in Web-Application-Firewall are comparing it to the libraries listed below
Sorting:
- Juniper backdoor☆14Updated 10 years ago
- Advance URL Fuzzing + Whois Domain running on python☆18Updated 3 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 10 years ago
- 一个简单的NIDS系统☆15Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 11 years ago
- 根据Golismero源码二次开发的分布式漏洞扫描器(调试版)☆18Updated 9 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 10 years ago
- LFI scan, exploit tool☆13Updated 11 years ago
- ☆13Updated 3 years ago
- ☆14Updated 7 years ago
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- Vulners signature-base software version detection rules☆38Updated 4 years ago
- IronBee Rules☆18Updated 12 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Source Code Intelligence☆30Updated 8 years ago
- Tagging and annotation framework for scan data☆101Updated 7 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 8 years ago
- Snort rules☆35Updated 7 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 8 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago