Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop malicious requests from known attacks such as SQL Injection, XSS attacks and from unknown attacks by learning the legitimate traffic.
☆16Jan 11, 2017Updated 9 years ago
Alternatives and similar repositories for Web-Application-Firewall
Users that are interested in Web-Application-Firewall are comparing it to the libraries listed below
Sorting:
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆16Feb 10, 2015Updated 11 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Clone Git repository faster. Eliminates the repetitive typing of git clone and copy-pasting the url☆16Dec 17, 2017Updated 8 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Vagrant instance to test Aptly and Jenkins Builds☆25Mar 19, 2016Updated 9 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- Программирование боевого софта под Linux☆17Aug 2, 2021Updated 4 years ago
- Splunk Web Shell☆51Mar 25, 2015Updated 10 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- Some tools based on docker☆24Jul 28, 2020Updated 5 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 6 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Jan 8, 2018Updated 8 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Simple multi threaded tool to extract domain related data from commoncrawl.org☆31Jul 17, 2018Updated 7 years ago
- A ctf competition program.☆27Oct 26, 2015Updated 10 years ago
- security machine learning☆72May 15, 2017Updated 8 years ago
- DragonJAR Automatic Windows Forensic☆13May 23, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- 工作利器(推荐使用率最高的工具)☆30May 30, 2017Updated 8 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Tupelo reference signer implementation☆14Sep 29, 2020Updated 5 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- asdf plugin for podman.☆10Aug 31, 2023Updated 2 years ago
- Find API keys in your code.☆40Aug 18, 2021Updated 4 years ago
- This is a webshell open source project☆31Apr 20, 2016Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago