BBVA / waf-brain
Machine Learning WAF Based
☆94Updated 4 years ago
Alternatives and similar repositories for waf-brain
Users that are interested in waf-brain are comparing it to the libraries listed below
Sorting:
- ☆75Updated 7 years ago
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆110Updated 2 years ago
- ☆82Updated 4 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆186Updated last year
- Simple machine learning based web application firewall (WAF) created in python☆57Updated last year
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- Suspicious DGA from PDNS and Sandbox.☆184Updated 2 years ago
- Signature-free approach library to detect injection and commanding attacks☆89Updated 3 years ago
- Web Application Firewall Benchmark☆12Updated 3 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆46Updated 4 years ago
- Automated SonarQube☆73Updated 5 years ago
- SQL injection detection engine built on of SQL tokenizing and syntax analysis written in C☆61Updated 4 years ago
- 使用机器学习识别WebShell☆127Updated 7 years ago
- Framework for Testing WAFs (FTW!)☆129Updated last year
- HIDS全称是Host-based Intrusion Detection System,即基于主机型入侵检测系统,HIDS运行依赖这样一个原理:一个成功的入侵者一般而言都会留下他们入侵的痕迹。本人更倾向于通过记录主机的重要信息变更来发现入侵者。 本项目由两部分组成:一部分…☆106Updated 7 years ago
- dns tunnel dectect with CNN☆64Updated 5 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆141Updated 5 years ago
- Artificial intelligence-driven Web Firewall☆179Updated 8 years ago
- Machine learning driven web application firewall to detect malicious queries with high accuracy.☆425Updated 8 years ago
- 记录我的安全学术学习☆129Updated 4 years ago
- Network Security Vulnerability Scanner☆116Updated 2 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Monitor, Alert, and Discover sensitive info and data leakage on Github.☆112Updated 3 years ago
- datacon比赛方向三-攻击源与攻击者分析writeup☆93Updated 5 years ago
- Resources for CloudNative security research☆32Updated 3 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- ☆105Updated 7 years ago