Veridax / privapiLinks
Detect Sensitive REST API communication using Deep Neural Networks
☆46Updated 2 years ago
Alternatives and similar repositories for privapi
Users that are interested in privapi are comparing it to the libraries listed below
Sorting:
- Tripod is a tool/ML model for computing latent representations for large sequences☆16Updated 3 weeks ago
- ☆35Updated 4 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- ML research on software vulnerabilities☆19Updated 5 years ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated 2 years ago
- My notes on various topics☆64Updated last year
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25Updated 8 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated last month
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆120Updated 9 months ago
- Security scanning & static analysis tool☆94Updated 7 months ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 8 years ago
- Apache Metron Workshop Lab materials and instructions.☆35Updated 5 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- ☆30Updated 6 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆29Updated 6 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 3 months ago
- A tool for auditing medical devices and healthcare infrastructure☆20Updated 2 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- A compiler for the Meta Attack Language☆15Updated 3 years ago
- dataShark is a Security & Network Event Analytics Framework built on Apache Spark☆45Updated 8 years ago
- IriusRisk Community☆65Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- YETI is a TAXII implementation☆46Updated 6 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 6 years ago