BBVA / waf-brainLinks
Machine Learning WAF Based
☆94Updated 4 years ago
Alternatives and similar repositories for waf-brain
Users that are interested in waf-brain are comparing it to the libraries listed below
Sorting:
- ☆75Updated 7 years ago
- Simple machine learning based web application firewall (WAF) created in python☆57Updated last year
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆186Updated last year
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆157Updated 3 years ago
- ☆83Updated 4 years ago
- Machine learning driven web application firewall to detect malicious queries with high accuracy.☆425Updated 8 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆110Updated 2 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆47Updated 4 years ago
- SQL injection detection engine built on of SQL tokenizing and syntax analysis written in C☆61Updated 4 years ago
- Web Application Firewall Benchmark☆12Updated 3 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- Suspicious DGA from PDNS and Sandbox.☆185Updated 2 years ago
- Automated SonarQube☆73Updated 6 years ago
- 使用机器学习识别WebShell☆127Updated 7 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Artificial intelligence-driven Web Firewall☆179Updated 8 years ago
- tcp stream dump with BPF filter rules | bidirection | domain☆48Updated 6 years ago
- HIDS全称是Host-based Intrusion Detection System,即基于主机型入侵检测系统,HIDS运行依赖这样一个原理:一个成功的入侵者一般而言都会留下他们入侵的痕迹。本人更倾向于通过记录主机的重要信息变更来发现入侵者。 本项目由两部分组成:一部分…☆106Updated 7 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- Framework for Testing WAFs (FTW!)☆129Updated last year
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆29Updated 2 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆269Updated 2 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43Updated 6 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago
- Signature-free approach library to detect injection and commanding attacks☆91Updated 3 years ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆30Updated 11 months ago