sudeshnapal12 / Web-Application-Firewall
Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop malicious requests from known attacks such as SQL Injection, XSS attacks and from unknown attacks by learning the legitimate traffic.
☆16Updated 8 years ago
Alternatives and similar repositories for Web-Application-Firewall:
Users that are interested in Web-Application-Firewall are comparing it to the libraries listed below
- Industrial Security Checklist☆10Updated 8 years ago
- Vipasyin Webshell detector (golang)☆8Updated 9 years ago
- passive dns collector☆10Updated 7 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- ☆13Updated 2 years ago
- 一个简单的NIDS系统☆15Updated 7 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- CVE-2018-1111 DynoRoot☆12Updated 6 years ago
- ☆14Updated 6 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆12Updated 9 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 7 years ago
- ☆20Updated last year
- A lightweight web application firewall module for nginx, which is already used in the production environment.☆14Updated 10 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated 2 years ago
- ☆14Updated 6 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- 针对PHP网马的正则查杀☆12Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- DoS PoC's for SAP products☆50Updated 7 years ago
- check cmd execute☆13Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆37Updated 7 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- Juniper backdoor☆13Updated 9 years ago
- web Log Forensics☆9Updated 9 years ago
- A mysql honeypot, still very very early stage☆21Updated 12 years ago
- Penetration Test Framwork☆22Updated 6 years ago
- ☆16Updated 7 years ago