alviser / mitchLinks
a Machine Learning powered CSRF attacks finding tool
☆27Updated 6 years ago
Alternatives and similar repositories for mitch
Users that are interested in mitch are comparing it to the libraries listed below
Sorting:
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 11 months ago
- ☆20Updated 9 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- Dataset used in WAF-A-MoLE paper☆8Updated 5 years ago
- A machine learning approach to detect phishing urls☆28Updated 2 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆48Updated 2 months ago
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Updated 5 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Updated 5 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Testability Pattern Catalogs for SAST☆30Updated 3 months ago
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- ☆13Updated 2 years ago
- Modeling Password Guessability Using Markov Models☆57Updated 5 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- Run-time trojan attack on neural networks☆26Updated 6 years ago
- ☆19Updated 6 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- ☆44Updated 3 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆24Updated 2 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated 3 weeks ago
- ☆23Updated 6 years ago
- Example of passing file descriptors into a container to perform a privilege escalation on the host☆23Updated 4 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 5 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆30Updated 7 years ago
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- ☆16Updated 7 years ago
- AutoSpear☆61Updated last year
- Joern Workshops☆26Updated 4 months ago