Veridax / privapi
Detect Sensitive REST API communication using Deep Neural Networks
☆46Updated last year
Alternatives and similar repositories for privapi:
Users that are interested in privapi are comparing it to the libraries listed below
- ☆30Updated 6 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- ☆33Updated 8 years ago
- ☆36Updated 3 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago
- A tool for auditing medical devices and healthcare infrastructure☆20Updated last year
- Graph database version of the CVE database☆25Updated 2 years ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated 2 years ago
- A zero-dependency tool for finding secrets in directories☆10Updated 3 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated 10 months ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- ML research on software vulnerabilities☆19Updated 5 years ago
- My notes on various topics☆64Updated last year
- Externalize Java application access to protected resources as log messages.☆41Updated 8 months ago
- ☆16Updated 6 years ago
- Data Feed Manager (news watch orchestrator to predict topic with deepdetect and store cleaned text in elasticsearch)☆40Updated 2 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Updated 4 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated last year
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- ☆25Updated 3 years ago
- A Security Scanner for Go☆26Updated 5 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- Some of the presentations given by me☆17Updated 2 months ago
- ☆50Updated 6 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆105Updated 2 years ago
- An extended Node.js runtime with additional security mechanisms built-in. Protects your Node.js applications from injection attacks such …☆31Updated 3 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 4 years ago