☆77Feb 26, 2018Updated 8 years ago
Alternatives and similar repositories for Machine-Learning-Web-Application-Firewall-and-Dataset
Users that are interested in Machine-Learning-Web-Application-Firewall-and-Dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP request…☆26Mar 5, 2024Updated 2 years ago
- This project contains datasets for Cross Site Scripting (XSS), SQL, and LDAP injections. The project also contains the Matlab code for cr…☆19Dec 18, 2020Updated 5 years ago
- ☆25Aug 13, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆200Mar 6, 2024Updated 2 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆55Sep 4, 2020Updated 5 years ago
- A platform that provides users with easy access to AI services developed by Montimage and usage of explainable AI techniques (e.g., LIME,…☆10Feb 17, 2026Updated last month
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- A security.txt parser for PHP☆13Oct 8, 2017Updated 8 years ago
- ZAP add-on containing the web-backdoors and attack files from FuzzDB☆20Apr 1, 2026Updated 2 weeks ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- 基于Opendaylight的packet-in flooding攻击的防护☆11Mar 25, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- notes about GNNs☆11Apr 8, 2019Updated 7 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 6 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- Cross-site-scripting attacks: A Comprehensive dataset for AI techniques usage☆21Apr 15, 2022Updated 4 years ago
- A parser for the SecRules Langue☆23Apr 7, 2026Updated last week
- A Python notebook showcasing the use of Machine Learning for the task of bot detection, with an emphasis on e-commerce sites.☆14Jul 8, 2021Updated 4 years ago
- ☆22Nov 16, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 使用Flink实现用户行为分析☆11Jun 29, 2020Updated 5 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 6 months ago
- ☆23May 15, 2019Updated 6 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- ☆15May 23, 2022Updated 3 years ago
- Bug Bounty Recon wordlist Generator☆21Jul 17, 2020Updated 5 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- ☆11May 19, 2018Updated 7 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- ☆24Oct 2, 2018Updated 7 years ago
- ☆14Jun 26, 2022Updated 3 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.☆11Aug 1, 2019Updated 6 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 11 months ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago