Official ModSecurity Docker + Core Rule Set (CRS) images
-
Updated
May 24, 2024 - Shell
Official ModSecurity Docker + Core Rule Set (CRS) images
HTTP & OAuth Gateway and Web Application Firewall (WAF) based on ModSecurity, online demo: https://door.caswaf.com
Implementation of ModSecurity, Core Rule Set (CRS) on Apache server. ModSecurity, sometimes called Modsec, is an open-source web application firewall. ModSecurity was installed and configured on an Ubuntu VM using Virtual Box
Implementing reverse proxy with NGINX
A custom Docker image based on the official ModSecurity image.
Erlang NIF to talk to libmodsecurity3
Build and run a Docker container of ModSecurity WAF system on Kong API Gateway server which runs on the top of Nginx server
Docker file from nginx:alpine with ModSecurity (lib v3)
Using WEB security module together with NGINX inside a container to facilitate the protection of the application, based on OWASP ModSecurity Core Rule Set rules to further improve protection.
NGINX reverse proxy using ModSecurity WAF to protect a web application
A CLI wrapper for libmodsecurity (v3.0.10)
Practice exercises to enhance skills in tuning OWASP ModSecurity core rule set rules and implementing your own rules.
Docker Image for Bedrock WP Projects (contains PHP, Apache)
Storing and serving mod_security rules as web services for the web developer easily integrating into their website. Building using Jersey framework and Grizzly HTTP Server as embedded server.
parsing modsecurity logfiles
Deploy DVWA Webserver + ModSecurity + Scanner for researching rules. Auto deployment scripts are supported
ModSecurity 3.0 and NGINX
Apache2 Modsecurity
Ansible role for installing Nginx, compiling ModSecurity3, and configuring the OWASP CRS v3 ruleset
Add a description, image, and links to the modsecurity-core-rule-set topic page so that developers can more easily learn about it.
To associate your repository with the modsecurity-core-rule-set topic, visit your repo's landing page and select "manage topics."