Veridax / privapi
Detect Sensitive REST API communication using Deep Neural Networks
☆46Updated last year
Alternatives and similar repositories for privapi:
Users that are interested in privapi are comparing it to the libraries listed below
- Graph database version of the CVE database☆25Updated 2 years ago
- ☆33Updated 8 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- ML research on software vulnerabilities☆19Updated 5 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago
- Sensitive Data Discovery tool☆32Updated 6 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- My notes on various topics☆64Updated last year
- Tripod is a tool/ML model for computing latent representations for large sequences☆16Updated 11 months ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Updated 3 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 6 years ago
- ☆30Updated 6 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago
- Sensitive Data Management: Data Discovery and Anonymization toolkit☆150Updated last month
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆118Updated 7 months ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Reading List for CSIRT Team Members☆17Updated 5 years ago
- RFD Checker - security CLI tool to test Reflected File Download issues☆61Updated 6 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 4 years ago
- DEF CON 26 WorkShop - Fuzzing FTW☆19Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 2 years ago
- Data Feed Manager (news watch orchestrator to predict topic with deepdetect and store cleaned text in elasticsearch)☆40Updated 2 years ago
- Simple DNS exfiltration using base64-encoded URL's☆14Updated 7 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- ☆25Updated 3 years ago