There are 2 repositories under bigip topic.
Testing TLS/SSL encryption anywhere on any port
Repository for F5 Container Ingress Services for Kubernetes & OpenShift.
Terraform resources that can configure F5 BIG-IP products
Prometheus exporter for BIG-IP metrics
Azure Resource Manager Templates for quickly deploying BIG-IP services in Azure
F5 BIG-IP SDK for the Go programming language.
Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.
:cookie: A CLI tool and library allowing to simply decode all kind of BigIP cookies.
iRules, scripts, iApps, ...
Convert BIG-IP configs to AS3 and DO declarations
Detecting and decoding BIGIP cookies in bash
This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
http://testssl.sh/ in a tiny docker container
Azure Resource Manager Templates for quickly deploying BIG-IP services in Azure
An implementation of K8S Gateway API Based on F5 BIG-IP.
The F5 Agent for OpenStack Neutron allows you to deploy BIG-IP services in an OpenStack environment.
:gear: Essential Ansible containers with F5 modules and extensible playbooks
TMOS parser and application extractor
Service to automatically upload files to F5 BigIP as LTM iFiles.
Technical documentation related to the use of F5 products and tools in OpenStack
Tool to automatically update F5 BigIP CRLs and their associated LTM Client SSL profile
Heat Templates for quickly deploying BIG-IP services in OpenStack
F5 Networks® OpenStack Heat Plugin Library
CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.
Example iRule to insert security headers that F5 BIG-IP webUI/TMSH does not currently have options for
Automation work flows for some of the verified designs examples using BIGIP
Nagios check to monitor SSL certificates expiration in a F5 BigIP appliance
Ansible module to perform specific operational and configuration tasks on F5 systems
Terraform modules for deploying F5 BIG-IP on Google Cloud Platform. Community supported.