BBVA / waf-brainLinks
Machine Learning WAF Based
☆94Updated 4 years ago
Alternatives and similar repositories for waf-brain
Users that are interested in waf-brain are comparing it to the libraries listed below
Sorting:
- ☆76Updated 7 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆192Updated last year
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆112Updated 3 years ago
- Simple machine learning based web application firewall (WAF) created in python☆59Updated last year
- Machine learning driven web application firewall to detect malicious queries with high accuracy.☆428Updated 8 years ago
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- Framework for Testing WAFs (FTW!)☆132Updated last year
- Signature-free approach library to detect injection and commanding attacks☆96Updated 3 years ago
- Web Application Firewall Benchmark☆12Updated 3 years ago
- The Web Application Vulnerability Scanner Evaluation Project☆237Updated 2 years ago
- Suspicious DGA from PDNS and Sandbox.☆186Updated 3 years ago
- ☆84Updated 4 years ago
- dns tunnel dectect with CNN☆63Updated 5 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- ☆55Updated last year
- NVD/CVE as JSON files☆122Updated last month
- 使用机器学习识别WebShell☆127Updated 7 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆50Updated 5 years ago
- Resources for CloudNative security research☆32Updated 4 years ago
- WAF Research☆182Updated 3 years ago
- Artificial intelligence-driven Web Firewall☆178Updated 8 years ago
- Web Input Vector Extractor Teaser☆132Updated 3 years ago
- awesome security paper☆154Updated 9 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆23Updated 6 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆142Updated 5 years ago
- ☆186Updated this week
- Automated SonarQube☆70Updated 6 years ago
- HIDS全称是Host-based Intrusion Detection System,即基于主机型入侵检测系统,HIDS运行依赖这样一个原理:一个成功的入侵者一般而言都会留下他们入侵的痕迹。本人更倾向于通过记录主机的重要信息变更来发现入侵者。 本项目由两部分组成:一部分…☆106Updated 7 years ago