Veridax / privapiLinks
Detect Sensitive REST API communication using Deep Neural Networks
☆46Updated 2 years ago
Alternatives and similar repositories for privapi
Users that are interested in privapi are comparing it to the libraries listed below
Sorting:
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Tripod is a tool/ML model for computing latent representations for large sequences☆16Updated 2 months ago
- My notes on various topics☆64Updated last year
- ☆30Updated 7 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆153Updated 6 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- ☆16Updated 7 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- Graph database version of the CVE database☆26Updated 2 years ago
- Apache Metron Workshop Lab materials and instructions.☆35Updated 5 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆23Updated last year
- ML research on software vulnerabilities☆19Updated 5 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 2 years ago
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆119Updated 11 months ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- dataShark is a Security & Network Event Analytics Framework built on Apache Spark☆45Updated 8 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- OWASP Foundation Web Respository☆27Updated 2 weeks ago
- Externalize Java application access to protected resources as log messages.☆42Updated last week
- CVE.ICU code.☆42Updated this week
- Checkpot Honeypot Checker☆45Updated 6 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Software Security course☆21Updated 10 years ago
- Vulnerability Information Aggregator for CVEs☆122Updated 6 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago