bunkerweb_1.6.2-rc5_amd64.deb
Install the package
sudo apt-get install bunkerweb=1.6.2-rc5
BunkerWeb 1.6.2-rc5 for Debian 12
Checksums
MD5 | 5b7f3951362ed1a55d00844d95dd8cbd |
SHA1 | 0e4773030000f79145f61e54663976f509f687a1 |
SHA256 | d42675239c8b4d5405178c6680fbb6c664786ebcc481289770b925d61264a01f |
SHA512 | 5d8ba555dca7e51e784f9e2f332aa0eb575deeed22bb517f2e88658eaeb5c09d387050599dbf1c1a6db7ac687380773ae93068af61c07b6e23d1ef3e19e2018f |
Depends
- bash, python3, procps, python3-pip, nginx (= 1.28.0-1~bookworm), libcurl4, libgeoip-dev, libxml2, libyajl2, libmagic1, net-tools, sudo, lsof, libpq5, libpcre3, libcap2-bin, logrotate, mariadb-client, postgresql-client, sqlite3, unzip, tar
Files
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/RESPONSE-950-DATA-LEAKAGES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-949-BLOCKING-EVALUATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-934-APPLICATION-ATTACK-NODEJS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-922-MULTIPART-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-921-PROTOCOL-ATTACK.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-913-SCANNER-DETECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-912-DOS-PROTECTION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-910-IP-REPUTATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9006-XENFORO-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9005-CPANEL-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9004-DOKUWIKI-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9003-NEXTCLOUD-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-901-INITIALIZATION.conf
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/php-variables.data
- /usr/share/bunkerweb/core/modsecurity/files/coreruleset-v3/rules/php-function-names-933151.data
Uploaded
10 days agoPackage Size
111 MBInstalled Size
332 MBDownloads
3
wget
wget --content-disposition "https://packagecloud.io/bunkerity/bunkerweb/packages/debian/bookworm/bunkerweb_1.6.2-rc5_amd64.deb/download.deb?distro_version_id=215"