theMiddleBlue / modsecurity-to-elasticsearch
Very simple and primitive Python script that sends ModSecurity JSON Audit Logs to Elasticsearch
☆17Updated 6 years ago
Alternatives and similar repositories for modsecurity-to-elasticsearch
Users that are interested in modsecurity-to-elasticsearch are comparing it to the libraries listed below
Sorting:
- Set of CLI tools to transform ModSecurity logs into a meaningful information, given a context.☆52Updated 2 years ago
- Documentation for the OWASP CRS project☆40Updated 4 years ago
- The ModSecurity Pcap Connector☆27Updated 9 years ago
- Python bindings for libModSecurity (aka ModSecurity v3)☆25Updated 6 years ago
- WAF-FLE, ModSecurity Console☆143Updated 2 years ago
- IronBee Rules☆19Updated 11 years ago
- Faraday Continuous Scanning☆34Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- A minimal Java client for the Nessus XML RPC interface☆23Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆34Updated 8 years ago
- Chef Cookbook which provisions apache+mod_security+owasp-crs☆37Updated 6 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆23Updated 8 years ago
- Cookbook for mod_security deployment☆25Updated 2 years ago
- A simple Shellshock scanner in python☆41Updated 10 years ago
- Web Sight Back-end Community Edition☆43Updated 2 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Updated 3 years ago
- Framework for Testing WAFs (FTW!)☆129Updated last year
- Automated SonarQube☆73Updated 5 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- CVE-2016-2776☆27Updated 8 years ago
- ☆14Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- [ABANDONED] A Docker container running Suricata and the ELK stack.☆21Updated 9 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Updated 7 years ago
- ☆28Updated 11 months ago
- Application Layer IDS/IPS with iptables☆76Updated 6 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago