All Projects → echo-devim → litewaf

echo-devim / litewaf

Licence: MIT License
Lightweight In-App Web Application Firewall for PHP

Programming Languages

PHP
23972 projects - #3 most used programming language

Projects that are alternatives of or similar to litewaf

Cerberus
一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (+1115.63%)
Mutual labels:  waf, xss
Web Security Learning
Web-Security-Learning
Stars: ✭ 3,619 (+11209.38%)
Mutual labels:  xss, sqlinjection
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+4234.38%)
Mutual labels:  waf, xss
Xray
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
Stars: ✭ 6,218 (+19331.25%)
Mutual labels:  xss, sqlinjection
Janusec
Janusec Application Gateway, Provides Fast and Secure Application Delivery. JANUSEC应用网关,提供快速、安全的应用交付。
Stars: ✭ 771 (+2309.38%)
Mutual labels:  waf, xss
Xwaf
xWAF 3.0 - Free Web Application Firewall, Open-Source.
Stars: ✭ 48 (+50%)
Mutual labels:  waf, xss
Secbox
🖤 网络安全与渗透测试工具导航
Stars: ✭ 222 (+593.75%)
Mutual labels:  waf, xss
hast-util-sanitize
utility to sanitize hast nodes
Stars: ✭ 34 (+6.25%)
Mutual labels:  xss
PastebinMarkdownXSS
XSS in pastebin.com and reddit.com via unsanitized markdown output
Stars: ✭ 84 (+162.5%)
Mutual labels:  xss
SQL-Injection-cheat-sheet
Cheatsheet to exploit and learn SQL Injection.
Stars: ✭ 69 (+115.63%)
Mutual labels:  sqlinjection
terraform-provider-incapsula
This package is a plugin for Terraform, and is designed to be used to auto-provision sites in Incapsula via Incapsula’s API from the terraform cli/yaml configurations.
Stars: ✭ 27 (-15.62%)
Mutual labels:  waf
security-wrapper
对springSecurity进行二次开发,提供OAuth2授权(支持跨域名,多应用授权)、JWT、SSO、文件上传、权限系统无障碍接入、接口防刷、XSS、CSRF、SQL注入、三方登录(绑定,解绑)、加密通信等一系列安全场景的解决方案
Stars: ✭ 21 (-34.37%)
Mutual labels:  xss
Eagle
Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities
Stars: ✭ 85 (+165.63%)
Mutual labels:  xss
diwa
A Deliberately Insecure Web Application
Stars: ✭ 32 (+0%)
Mutual labels:  xss
sqli scan
SQL注入扫描器
Stars: ✭ 16 (-50%)
Mutual labels:  sqlinjection
docker-wallarm-node
⚡️ Docker official image for Wallarm Node. API security platform agent.
Stars: ✭ 18 (-43.75%)
Mutual labels:  waf
wasec
Examples of security features (or mishaps) on web applications -- these are mostly examples and tutorials from the WASEC book.
Stars: ✭ 74 (+131.25%)
Mutual labels:  xss
persistent-clientside-xss
Exploit generator and Taint Engine to find persistent (and reflected) client-side XSS
Stars: ✭ 19 (-40.62%)
Mutual labels:  xss
APSoft-Web-Scanner-v2
Powerful dork searcher and vulnerability scanner for windows platform
Stars: ✭ 96 (+200%)
Mutual labels:  xss
vulture-base
Vulture 4 base system and bootstrap scripts
Stars: ✭ 33 (+3.13%)
Mutual labels:  waf

LiteWAF

LiteWAF is a simple in-app Web Application Firewall. It is a single php script that must be included at the beginning of each page you want to protect. For each request, the script parses the parameters looking for well known attacks.

Actually the script supports the following attack types:

  • XSS
  • SQL Injection
  • Path Traversal
  • Remote Command Execution

When an attack attempt is detected the script logs the event into attacklogs.php file and then redirects the user to a default page.

The attacklogs.php script contains the logs, but it is authenticated. Thus means that you need to provide the right password to access the logs (url: attacklogs.php?pwd=your_password). Even attacklogs.php is protected by LiteWAF.

At the moment the logs are stored in plain text. Each row contains several information about the event (datetime, ip, user-agent, url requested, attack type, etc.).

This tool is based on signature matching, this means that bypass techniques can exist. However it should block and log the major part of the attacks.

Configuration

You can configure the tool editing the beginning of litewaf.php. You can set where to redirect the user when an attack is detected (index is the default location). You can set the log file path (it must be a php file). You must set the directory containing litewaf.php. Finally, you can set the password to access the log file (random by default) and if redirect a user that provides the wrong credentials.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].