AI driven Web Application Firewall
☆32Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for AI-WAF
Users that are interested in AI-WAF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- Jhonarendra Github Pages☆12Feb 5, 2023Updated 3 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆207Apr 28, 2023Updated 2 years ago
- NGINX reverse proxy using ModSecurity WAF to protect a web application☆17Apr 14, 2020Updated 6 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- React-Flo is a React based visual node graph editor☆12May 24, 2018Updated 7 years ago
- 在协同开发中让代码风格保持一致☆26Jun 6, 2017Updated 8 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- as stated in the title☆14Updated this week
- Example of nginx HTTP module using thread pools☆13Oct 28, 2017Updated 8 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Self-use Profile☆12Mar 10, 2025Updated last year
- an app for charting forex using some principles of the wyckoff method☆12Sep 1, 2015Updated 10 years ago
- ☆16Dec 13, 2017Updated 8 years ago
- 简单的二进制加密壳☆12Aug 2, 2020Updated 5 years ago
- Syncrypt command line client and sync daemon☆11Jan 5, 2024Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- GPT-3 use cases for Cybersecurity☆54Sep 20, 2023Updated 2 years ago
- IPython-style interaction for Cryptol☆15Dec 5, 2016Updated 9 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆13Apr 16, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Gambling webpage with a three-layer architecture and client-server based. Languages used: JAVA for the backend and HTML, CSS, JS and JQue…☆11Nov 8, 2019Updated 6 years ago
- Open Enigma - This repository contains the Arduino code for the S&T GeoTronics M4 Enigma.☆14Oct 2, 2021Updated 4 years ago
- Native BOINC client for android and boinc applications☆39Feb 10, 2015Updated 11 years ago
- ☆68Oct 17, 2022Updated 3 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆12Oct 27, 2020Updated 5 years ago
- 🖱2021腾讯游戏安全技术竞赛-机器学习 4th☆11Apr 19, 2021Updated 4 years ago
- Incremental Offline/Online PIR☆14Apr 4, 2024Updated 2 years ago
- ☆11Jun 22, 2025Updated 9 months ago
- 基于ChatGPT大语言模型,通过聊天机器人自动创建vulhub的漏洞靶机环境。☆24Apr 23, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- 一个主要用于xmind转excel测试case的小脚本,☆11Dec 5, 2019Updated 6 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- CVE漏洞挖掘 (CVE Vulnerability Hunting), by Tr0e.☆18Jun 21, 2025Updated 9 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago