Veridax / privapiLinks
Detect Sensitive REST API communication using Deep Neural Networks
☆46Updated 2 years ago
Alternatives and similar repositories for privapi
Users that are interested in privapi are comparing it to the libraries listed below
Sorting:
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- ☆30Updated 7 years ago
- Tripod is a tool/ML model for computing latent representations for large sequences☆16Updated 8 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- My notes on various topics☆67Updated 2 years ago
- ML research on software vulnerabilities☆18Updated 6 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆24Updated 5 months ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 7 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Updated 3 years ago
- ☆33Updated 9 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Stringlifier is on Opensource ML Library for detecting random strings in raw text. It can be used in sanitising logs, detecting accidenta…☆170Updated 8 months ago
- defplorex for BlackHat Arsenal☆116Updated 8 years ago
- Graph database version of the CVE database☆26Updated 3 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆21Updated 3 years ago
- Identifies phishing websites using a treebag model☆22Updated 5 years ago
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆123Updated last year
- Security scanning & static analysis tool☆93Updated last year
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 3 years ago
- ☆138Updated 6 years ago
- Machine Learning for Computer Security☆281Updated 4 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 9 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Updated 7 years ago
- A full example report☆11Updated 6 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44Updated 3 years ago
- eXpose deep neural network, detects malicious URLs, file paths and registry keys with proper training☆47Updated 7 years ago