obarrera / ML-XSS-DetectionLinks
A Machine Learning Model to classify samples as XSS (Cross Site-Scrtpting)
☆31Updated 2 years ago
Alternatives and similar repositories for ML-XSS-Detection
Users that are interested in ML-XSS-Detection are comparing it to the libraries listed below
Sorting:
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆48Updated 4 years ago
- Simple machine learning based web application firewall (WAF) created in python☆58Updated last year
- An ongoing & curated collection of awesome web vulnerability - Server-side request forgery software practices and remediation, libraries…☆18Updated 3 years ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆102Updated last year
- A Machine Learning Based Web Application firewall☆11Updated last year
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆11Updated 3 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Machine Learning WAF Based☆95Updated 4 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- Vulnerability☆31Updated 2 months ago
- This repo contains all the injections mentioned in my talk and enumerators.☆127Updated last year
- Machine Learning for Cyber Security☆30Updated 3 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆191Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆11Updated 2 years ago
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆46Updated 2 years ago
- Showcase of DNS Exfiltration and Infiltration☆46Updated 4 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆52Updated 2 years ago
- An Intrusion Detection System written in Python☆26Updated last year
- A write-up of the famous vulnerable Juice Shop by bkimminich☆22Updated 8 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆12Updated last year
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆37Updated this week
- Pentest AI utilizes machine learning to fully automate penetration testing and exploitation for assessing port, web, and application secu…☆65Updated last month
- Prompt Injections Everywhere☆128Updated 10 months ago
- Dataset used in WAF-A-MoLE paper☆9Updated 5 years ago
- a python tool used to scan for Open redirection vulnerability☆20Updated 7 years ago