AvalZ / WAF-A-MoLE
A guided mutation-based fuzzer for ML-based Web Application Firewalls
☆184Updated last year
Alternatives and similar repositories for WAF-A-MoLE:
Users that are interested in WAF-A-MoLE are comparing it to the libraries listed below
- AutoSpear☆61Updated last year
- Machine Learning WAF Based☆94Updated 4 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆99Updated 4 years ago
- A penetration testing tool for finding file upload bugs (NDSS 2020)☆248Updated 4 years ago
- Grammar-based HTTP/2 fuzzer with mutation ability☆43Updated 2 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆73Updated 2 years ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆250Updated 5 months ago
- Suricata rules for the new critical vulnerabilities☆81Updated 4 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 10 months ago
- cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vul…☆141Updated 4 years ago
- ☆83Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆130Updated this week
- IoT and Operational Technology Honeypot☆105Updated last year
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆125Updated 2 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆122Updated last year
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- Static Token And Credential Scanner☆96Updated last year
- Tool for searching Exploits from Exploit Databases, etc.☆278Updated this week
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- Search an exploit in the local exploitdb database by its CVE☆171Updated 2 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆107Updated 5 years ago
- This repository contains materials related to our DeepSQLi paper published in ISSTA 2020.☆16Updated 4 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆95Updated last year
- This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)☆170Updated last year
- SADDNS: Side Channel Based DNS Cache Poisoning Attack☆56Updated 3 years ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆81Updated 8 years ago
- Python wrapper for the API of cve-search☆120Updated last year
- Exploit for WebSocket Vulnerability in Apache Tomcat☆166Updated 4 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated 10 months ago