ocatak / apache-http-logs
to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.
☆11Updated 3 years ago
Alternatives and similar repositories for apache-http-logs:
Users that are interested in apache-http-logs are comparing it to the libraries listed below
- OWASP Machine Learning Security Top 10 Project☆83Updated 2 months ago
- A deliberately vulnerable java app for educational purposes☆17Updated last year
- Explore AI Supply Chain Risk with the AI Risk Database☆53Updated 11 months ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆135Updated last year
- Machine Learning For Cybersecurity.☆65Updated 5 years ago
- OWASP Top 10 Infrastructure Security Risks☆34Updated 3 months ago
- Security Control Knowledge Graph☆28Updated last year
- CICD Using GitHub Action and Harness☆17Updated last year
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 8 months ago
- Exploit Prediction Scoring System (EPSS)☆25Updated 2 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆156Updated last year
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆196Updated last month
- Vulnerable Python Application To Learn Secure Development☆103Updated 10 months ago
- ☆21Updated 3 weeks ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 3 years ago
- ☆35Updated 3 years ago
- Example of using Gauge and OWASP ZAP for test automation☆10Updated 5 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 7 years ago
- OWASP Foundation Web Respository☆28Updated 8 months ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- OWASP Foundation Web Respository☆13Updated 11 months ago
- Software Component Verification Standard (SCVS)☆143Updated 3 weeks ago
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆28Updated 3 months ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- OWASP Foundation Web Respository☆34Updated 7 months ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- KEV EPSS Data☆23Updated this week
- Sample scan files for testing DefectDojo imports☆78Updated 3 months ago
- OWASP Foundation Web Repository☆47Updated 3 months ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆77Updated 11 months ago