Veridax / privapi
Detect Sensitive REST API communication using Deep Neural Networks
☆46Updated last year
Related projects ⓘ
Alternatives and complementary repositories for privapi
- ML research on software vulnerabilities☆19Updated 5 years ago
- An anomaly-based intrusion detection system.☆80Updated last year
- My notes on various topics☆64Updated last year
- Externalize Java application access to protected resources as log messages.☆41Updated 6 months ago
- Tripod is a tool/ML model for computing latent representations for large sequences☆16Updated 7 months ago
- ☆30Updated 6 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- A tool for detecting regular expression denial-of-service vulnerabilities in Android apps.☆33Updated 8 years ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆27Updated 2 years ago
- ☆33Updated 8 years ago
- OWASP Foundation Web Respository☆27Updated this week
- Legal, procedural and policies document templates for operating an IRT☆63Updated 8 months ago
- A tool for auditing medical devices and healthcare infrastructure☆21Updated last year
- Security Payload Unit Test Repository (SPUTR)☆86Updated last year
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated last year
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 2 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago
- Malware Machine Learning☆27Updated 6 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 4 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Sensitive Data Discovery tool☆32Updated 6 years ago
- ☆36Updated 3 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆42Updated 8 years ago
- ☆21Updated 4 years ago
- Static code search python lib☆18Updated 4 years ago
- Redis Security Map - Anti-hacking for Redis☆32Updated 2 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago