Machine Learning WAF Based
☆96Nov 3, 2020Updated 5 years ago
Alternatives and similar repositories for waf-brain
Users that are interested in waf-brain are comparing it to the libraries listed below
Sorting:
- LSTM and MLP for sql injection detection☆26Dec 9, 2018Updated 7 years ago
- Machine learning driven web application firewall to detect malicious queries with high accuracy.☆433May 15, 2017Updated 8 years ago
- An NGINX and ModSecurity based Web Application Firewall for Docker☆264Jun 21, 2023Updated 2 years ago
- Controller for PoW Shield (a layer7 DDoS filter) providing multi-instance utilities.☆11Sep 4, 2022Updated 3 years ago
- Notebooks for Alea GPU☆12Feb 16, 2017Updated 9 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Vagrant-based configurations intended for ModSecurity performance testing☆28Dec 8, 2023Updated 2 years ago
- Script to check ModSecurity rules agains some WAF☆12Oct 15, 2018Updated 7 years ago
- http response/request parser for rust☆13Aug 10, 2015Updated 10 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- Artificial intelligence-driven Web Firewall☆177Apr 6, 2017Updated 8 years ago
- ☆18Jun 26, 2017Updated 8 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 3 years ago
- Python sFlow collector capable of classifying flows and reporting traffic counters to ceilometer☆16Aug 25, 2017Updated 8 years ago
- A websocket-based approach to control a desktop application through the web☆19Dec 13, 2018Updated 7 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- JANUSEC Application Gateway provides secure access, including reverse proxy, K8S Ingress Controller, Automatic ACME Certificate, WAF, 5-S…☆1,193Aug 23, 2025Updated 6 months ago
- Web Application Firewall Testing Framework - Go version☆164Feb 27, 2026Updated last week
- Fuzz test Python modules with libFuzzer☆22Mar 20, 2022Updated 3 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Apr 9, 2019Updated 6 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- Framework for Testing WAFs (FTW!)☆137May 14, 2024Updated last year
- High-performance WAF built on the OpenResty stack☆1,312Jan 31, 2024Updated 2 years ago
- Blind XSS service alerting over slack or email☆29Aug 6, 2019Updated 6 years ago
- ☆33Dec 24, 2025Updated 2 months ago
- Access the process event connector in linux kernels from Python.☆27Oct 21, 2021Updated 4 years ago
- The DevSecOps toolset for REST APIs☆277Jan 13, 2023Updated 3 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- ☆62Sep 29, 2017Updated 8 years ago
- x-waf的web管理后台☆116Mar 22, 2017Updated 8 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Jan 8, 2020Updated 6 years ago
- SQLAlchemy bindings for WordPress☆13Oct 22, 2010Updated 15 years ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Executive coaching skill for planning your 2026 using research-backed process goals. Works with Claude Code and Claude.ai.☆28Jan 5, 2026Updated 2 months ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Jan 7, 2020Updated 6 years ago