alviser / mitchLinks
a Machine Learning powered CSRF attacks finding tool
☆26Updated 6 years ago
Alternatives and similar repositories for mitch
Users that are interested in mitch are comparing it to the libraries listed below
Sorting:
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- ☆19Updated 9 years ago
- A machine learning approach to detect phishing urls☆28Updated 3 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 6 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Modeling Password Guessability Using Markov Models☆57Updated 6 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- ☆29Updated 5 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Repository to showcase various configuration recipes with various technologies☆36Updated 2 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- Simple vulnerability scanning framework☆51Updated 8 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Exploit generator and Taint Engine to find persistent (and reflected) client-side XSS☆25Updated 5 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- HTML5 WebSocket message fuzzer☆147Updated 6 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆30Updated 7 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆193Updated last year
- BSidesSF CTF 2019 release☆71Updated 2 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- A fast generative fuzzer for HTTP☆17Updated 6 years ago
- NVD/CVE as JSON files☆123Updated this week
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- ☆44Updated 4 years ago
- Automatically exported from code.google.com/p/plcscan☆58Updated 10 years ago