Combined datasets of ECML/PKDD 2007 and CSIC 2010
☆42Jun 27, 2024Updated last year
Alternatives and similar repositories for Web-Application-Attack-Datasets
Users that are interested in Web-Application-Attack-Datasets are comparing it to the libraries listed below
Sorting:
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆54Sep 4, 2020Updated 5 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- ☆77Feb 26, 2018Updated 8 years ago
- Machine Learning on dataset HTTP CSIC 2010☆35May 25, 2018Updated 7 years ago
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- Machine Learning WAF Based☆96Nov 3, 2020Updated 5 years ago
- A Python notebook showcasing the use of Machine Learning for the task of bot detection, with an emphasis on e-commerce sites.☆14Jul 8, 2021Updated 4 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- ☆13May 15, 2022Updated 3 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Mar 21, 2022Updated 4 years ago
- Zero day attack detection AI model based on seq2seq autoencoder☆11May 31, 2022Updated 3 years ago
- Entropy clustering of IPv6 networks, see https://ipv6hitlist.github.io/☆13Sep 24, 2018Updated 7 years ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago
- ☆19Mar 27, 2020Updated 5 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- Demo of interactive physics simulation in JavaScript.☆11Nov 27, 2019Updated 6 years ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆30Sep 23, 2022Updated 3 years ago
- Detection of copy-move forgeries in images using image-signal representation methods☆11Apr 28, 2018Updated 7 years ago
- to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.☆11Aug 1, 2019Updated 6 years ago
- AutoSpear☆72Jan 5, 2024Updated 2 years ago
- Metis: Understanding and Enhancing Regular Expressions in Network☆14Aug 19, 2022Updated 3 years ago
- Open-source code to support BSides 2019's talk: Bye-Bye False Positives: Using AI to Improve Detection☆22Jan 19, 2024Updated 2 years ago
- Package mptcp provides detection functionality for active, multipath TCP connections from a remote client to the current host. MIT Licen…☆16May 19, 2015Updated 10 years ago
- Space tree search algorithm for IPv6 active addresses and aliased regions☆12Nov 21, 2020Updated 5 years ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- The repository of 6GAN, an IPv6 multi-pattern target generation algorithm using Generative Adversarial Nets with reinforcement learning. …☆21Dec 16, 2021Updated 4 years ago
- NoAuth 是一款用于动态生成可能绕过 Java 鉴权的 payload 并进行 fuzz 测试的工具,主要用于在代码审计和绕鉴权场景中节省时间☆18Jul 29, 2025Updated 7 months ago
- DO I ACCESS is a browser extension that transform DOI numbers into clickable links to the given sci-hub URL.☆14Jan 7, 2023Updated 3 years ago
- PART I DeepAR implementation based on paper: https://arxiv.org/pdf/1704.04110.pdf☆10Jun 20, 2019Updated 6 years ago
- LSTM and MLP for sql injection detection☆26Dec 9, 2018Updated 7 years ago
- My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP request…☆26Mar 5, 2024Updated 2 years ago
- 大手子们要是使用过后,能给菜鸡弟弟在Issues反馈个用后体验,那就真的是万分感激了。你一赞,我一赞,年薪百万不停转。☆11Dec 29, 2021Updated 4 years ago
- ☆93Jan 18, 2025Updated last year
- A mini audio player plugin for Jekyll☆12Dec 22, 2018Updated 7 years ago
- Modding the LOOΠΔ light stick with a custom PCB/firmware, rechargeable battery and a companion Android app for wireless control.☆13Sep 16, 2022Updated 3 years ago
- 网络安全中的人工智能方法,总结我在中国科学院大学的学习以及自己整理的资料、方法,给大家分享出来☆99Jan 16, 2026Updated 2 months ago
- ☆11Oct 7, 2023Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 8 years ago