SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors
☆14May 21, 2024Updated last year
Alternatives and similar repositories for SecureEye
Users that are interested in SecureEye are comparing it to the libraries listed below
Sorting:
- ☆29Jan 19, 2026Updated 2 months ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- Javascript sourcemaps enumeration tool☆15Dec 19, 2024Updated last year
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- This Repo Represents Indian Food Classification and with the help of this project you can easily identify the Indian food☆11Jun 15, 2021Updated 4 years ago
- This android app takes food item image as input ,recognises the food item and calculates the nutrition value on the food , calories to b…☆15Jan 30, 2022Updated 4 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- No Bullshit, JEE College Predictor (Basically locates as per past year Round 7)☆14Oct 13, 2020Updated 5 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- MessageBox files (EXE, DLL) for testing purposes.☆13Mar 9, 2019Updated 7 years ago
- ☆39May 4, 2025Updated 10 months ago
- ☆11Jan 18, 2020Updated 6 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- ☆22Apr 30, 2023Updated 2 years ago
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆13May 12, 2021Updated 4 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- https://youtu.be/2DXiOtEwWtU?si=yNnHXJTSXy9YEqK9☆26Apr 21, 2025Updated 11 months ago
- Passive subdomain enumeration tool for bug-bounty hunters & penetration testers.☆12Jan 10, 2021Updated 5 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Android SSL certificate validation vulnerability detection tools.☆20May 10, 2014Updated 11 years ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆18May 10, 2023Updated 2 years ago
- Real Android malware apps discussed in the book☆46Oct 12, 2023Updated 2 years ago
- This code generates a dataframe called the ‘Indian Nutrient Databank (INDB).’ INDB includes nutrient values for recipes commonly consumed…☆32Apr 8, 2025Updated 11 months ago
- ☆20Oct 29, 2015Updated 10 years ago
- a WebSocket cat.☆14Aug 5, 2017Updated 8 years ago
- Supertruder but better☆31Mar 10, 2023Updated 3 years ago
- Deep Learning Capstone Project. Live camera app that can interpret number strings in real-world images.☆14May 30, 2016Updated 9 years ago
- A MCP Server that provides browser access through playwright with "stealth mode" enabled.☆21Jun 29, 2025Updated 8 months ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- ☆22Oct 3, 2019Updated 6 years ago
- A SOCMINT tool with an interactive GUI to assist criminal investigations☆16Aug 8, 2020Updated 5 years ago