ahmadmursaleen / Vuln-Analysis-ML-PythonLinks
This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.
☆11Updated 6 years ago
Alternatives and similar repositories for Vuln-Analysis-ML-Python
Users that are interested in Vuln-Analysis-ML-Python are comparing it to the libraries listed below
Sorting:
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Updated 8 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆28Updated 4 years ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆24Updated 6 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- My notes on various topics☆64Updated last year
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- Presentations from the CX Security Labs team☆33Updated 9 months ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆16Updated 2 years ago
- An Intrusion Detection System written in Python☆26Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Updated 6 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- ☆45Updated 8 years ago
- 威胁检测规则集☆15Updated 6 years ago
- a Machine Learning powered CSRF attacks finding tool☆26Updated 6 years ago
- A Machine Learning Model that classifies the data in the images as Sensitive or Non-sensitive.☆65Updated 4 years ago
- ☆38Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆19Updated 3 years ago
- A machine learning approach to detect phishing urls☆28Updated 3 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 4 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆27Updated 6 years ago
- ☆17Updated 5 years ago