alviser / mitch
a Machine Learning powered CSRF attacks finding tool
☆26Updated 6 years ago
Alternatives and similar repositories for mitch:
Users that are interested in mitch are comparing it to the libraries listed below
- A machine learning approach to detect phishing urls☆27Updated 2 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 4 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 9 months ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- Dataset used in WAF-A-MoLE paper☆8Updated 4 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Updated 5 years ago
- HTTP Desync Attack☆28Updated 4 years ago
- ☆38Updated 4 years ago
- Run-time trojan attack on neural networks☆25Updated 6 years ago
- Result files from various fuzzing runs☆16Updated 3 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆30Updated 7 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- Machine Learning for Cyber Security☆28Updated 3 years ago
- ☆23Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Updated 6 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆32Updated 5 years ago
- CVE-2019-12949☆26Updated 5 years ago
- Software Security course☆21Updated 10 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- ☆29Updated 4 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 4 years ago
- ☆12Updated 2 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 5 years ago
- ☆17Updated 6 years ago
- Webshell Detection Based on Deep Learning☆11Updated 6 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Joern Workshops☆25Updated 2 months ago
- ☆13Updated 2 years ago