Web Applicaiton Firewall Implementation using Deep Learning
☆16Feb 3, 2023Updated 3 years ago
Alternatives and similar repositories for WAF
Users that are interested in WAF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 7 years ago
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆45Jun 27, 2024Updated last year
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- ☆77Feb 26, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- A GRU deep learning system against attacks in Software Defined Networks (SDN).☆35Apr 19, 2024Updated 2 years ago
- Fast API Endpoint!. This project examines, analyses the malware statically & dynamically using conventional strategies and also apply mac…☆10Apr 10, 2023Updated 3 years ago
- An open-source python script that can generate books using ChatGPT to be listed on Amazon KDP.☆14Jul 17, 2023Updated 2 years ago
- A small example how to connect the font to kivy app☆11Jun 2, 2014Updated 11 years ago
- Zero day attack detection AI model based on seq2seq autoencoder☆12May 31, 2022Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago
- ☆10Apr 5, 2019Updated 7 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Spring内存马检测和隐形马研究☆15Nov 28, 2021Updated 4 years ago
- 使用kprobe获取sys_execve参数☆12Nov 22, 2018Updated 7 years ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- A simple stateless packet filtering firewall built on top of eBPF/XDP☆11Nov 14, 2022Updated 3 years ago
- Detection of copy-move forgeries in images using image-signal representation methods☆11Apr 28, 2018Updated 8 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the…☆14Jan 3, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Detect and extract hidden files☆24Aug 29, 2024Updated last year
- paper code commit-fsmafl☆10Mar 18, 2024Updated 2 years ago
- Exploring internet domain names with deep learning using vector embeddings☆19Dec 14, 2018Updated 7 years ago
- DIY alternative to the very cool Flipper Zero project☆21Aug 4, 2022Updated 3 years ago
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- Tools to browse disk images and file system metadata in a web service☆24Jan 10, 2024Updated 2 years ago
- Phishing URL Detection with Deep Learning☆14Feb 28, 2024Updated 2 years ago
- Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using G…☆17Sep 19, 2021Updated 4 years ago
- NoAuth 是一款用于动态生成可能绕过 Java 鉴权的 payload 并进行 fuzz 测试的工具,主要用于在代码审计和绕鉴权场景中节省时间☆22Mar 27, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Jun 22, 2021Updated 4 years ago
- Upload automatisation for RedBubble☆16Oct 19, 2022Updated 3 years ago
- Reproduced Code for Image Forgery Detection papers.☆22Sep 22, 2021Updated 4 years ago
- 一本用代码写出来的Fuzzing书籍:The Fuzzing Book☆14Sep 30, 2023Updated 2 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 8 years ago
- Cloud Native Security News☆69Dec 27, 2024Updated last year
- LSTM and MLP for sql injection detection☆26Dec 9, 2018Updated 7 years ago