AWS Web Application Firewalls (WAFs) protect web applications and APIs from typical attacks from the Internet that can compromise security and availability, and put undue strain on servers and resources. The AWS WAF provides prebuilt security rules that help control bot traffic and block attack patterns. You can also create your own rules based on your own requirements. In simple scenarios and for smaller applications, this is very easy to implement on an individual basis. However, in larger environments with tens or even hundreds of applications, it is advisable to aim for central governance and automation. This simple solution helps you deploy, update and stage your Web Application Firewalls while managing them centrally via AWS Firewall Manager.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
A source code search engine for searching alphanumeric snippets, signatures, or keywords in web page HTML, JS, and CSS code.
A tool for detecting capabilities in executable files, providing insights into a program's behavior and potential malicious activities.
ConDroid performs concolic execution of Android apps to observe 'interesting' behavior in dynamic analysis.
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
A Java API for searching and downloading Android applications from Google Play with additional check-in features for generating ANDROID-ID.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A web application security testing platform that helps you test your knowledge on web application security through realistic scenarios with known vulnerabilities.
Integrates static APK analysis with Yara and requires re-compilation of Yara with the androguard module.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.