All Projects → deep-security → aws-waf

deep-security / aws-waf

Licence: other
Deep Security's APIs make it simple to integration with a variety of AWS Services

Projects that are alternatives of or similar to aws-waf

W3af
w3af: web application attack and audit framework, the open source web vulnerability scanner.
Stars: ✭ 3,804 (+8957.14%)
Mutual labels:  sql-injection, cross-site-scripting
xss-catcher
Simple API for storing all incoming XSS requests.
Stars: ✭ 26 (-38.1%)
Mutual labels:  cross-site-scripting
UBUNTU20-CIS
Ansible role for Ubuntu 2004 CIS Baseline
Stars: ✭ 136 (+223.81%)
Mutual labels:  security-automation
xssfinder
Toolset for detecting reflected xss in websites
Stars: ✭ 105 (+150%)
Mutual labels:  cross-site-scripting
burp-aem-scanner
Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common misconfigurations and security holes.
Stars: ✭ 60 (+42.86%)
Mutual labels:  security-automation
kali-my-linux
Install Kali Linux Tools & Others on your Linux.
Stars: ✭ 37 (-11.9%)
Mutual labels:  security-automation
Autosqli
An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (+428.57%)
Mutual labels:  sql-injection
MixewayHub
Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project contain one click docker-compose file which configure and run images from docker hub.
Stars: ✭ 80 (+90.48%)
Mutual labels:  security-automation
filter-var-sqli
Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )
Stars: ✭ 29 (-30.95%)
Mutual labels:  sql-injection
RapidRepoPull
The goal of this program is to quickly pull and install repos from its list
Stars: ✭ 40 (-4.76%)
Mutual labels:  security-automation
moadsd-ng
The MOADSD-NG project does provide a simple way to setup a hybrid cloud security demo, playground and learning environment within the clouds.
Stars: ✭ 13 (-69.05%)
Mutual labels:  deep-security
default-http-login-hunter
Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+578.57%)
Mutual labels:  security-automation
hackable
A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks
Stars: ✭ 61 (+45.24%)
Mutual labels:  sql-injection
hasherbasher
SQL injection via bruteforced MD5 hash reflection of random strings
Stars: ✭ 40 (-4.76%)
Mutual labels:  sql-injection
sandfly-setup
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (+7.14%)
Mutual labels:  security-automation
Intruderpayloads
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+6516.67%)
Mutual labels:  sql-injection
Vulnogram
Vulnogram is a tool for creating and editing CVE information in CVE JSON format
Stars: ✭ 103 (+145.24%)
Mutual labels:  security-automation
solutions-bwapp
In progress rough solutions to bWAPP / bee-box
Stars: ✭ 158 (+276.19%)
Mutual labels:  sql-injection
Tor-IP-Addresses
Hourly checked and updated list of IP Addresses of Tor and Tor Exit Nodes
Stars: ✭ 182 (+333.33%)
Mutual labels:  iplist
kube-image-bouncer
Simple endpoint for the ImagePolicyWebhook and the GenericAdmissionWebhook Kubernetes admission controllers
Stars: ✭ 63 (+50%)
Mutual labels:  security-automation

Project Retired

When AWS WAF launched, this project was created in order to provide the custom code required to use the information that Trend Micro Deep Security had about an EC2 instance in order to make smart rule choices in AWS WAF.

Over time, the Deep Security API has evolved, making this workflow easier using the APIs. Therefore this code has been retired and moved to a separate 'retired' branch.

To create the workflow using the newest APIs, please refer to Integrate Deep Security with AWS Services in the Deep Security Automation Center.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].