AI driven Web Application Firewall
☆32Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for AI-WAF
Users that are interested in AI-WAF are comparing it to the libraries listed below
Sorting:
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- A Python simulation of the PURPLE cipher machine used by the Japanese Foreign Office for secure communications before and during World Wa…☆12Nov 7, 2025Updated 3 months ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆24Feb 12, 2026Updated 3 weeks ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A Universal 32-bit iBoot patcher for iPhone OS 2.0 --> iOS 10☆11Mar 11, 2020Updated 5 years ago
- A crypto-programming language including an IDE☆12Feb 12, 2025Updated last year
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Implement CollAFL using LLVM LTO pass on afl++.☆12Sep 24, 2020Updated 5 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- LLM Security Guard for Code☆21Sep 8, 2024Updated last year
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- This repository accompanies the research paper "P. Kreutzer, S. Kraus, M. Philippsen: Language-Agnostic Generation of Compilable Test Pro…☆12Jul 8, 2022Updated 3 years ago
- ☆13May 5, 2018Updated 7 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- This app helps the farmers to convert from a food crop to a commercial crop by providing a full fledged cost and risk analysis.☆10Nov 4, 2018Updated 7 years ago
- 基于upx的SM4加密壳☆10May 12, 2023Updated 2 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆15May 6, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- ☆12Feb 16, 2024Updated 2 years ago
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Updated this week
- Some collection of router firmware tools☆11Aug 4, 2020Updated 5 years ago
- ☆10Jul 9, 2020Updated 5 years ago