sdnewhop / AISec
Cybersecurity of Machine Learning and Artificial Intelligence
☆64Updated 2 years ago
Related projects: ⓘ
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆53Updated 3 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆106Updated 4 years ago
- A write-up of the famous vulnerable Juice Shop by bkimminich☆19Updated 7 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆56Updated 4 years ago
- ☆45Updated 3 years ago
- Static Token And Credential Scanner☆94Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆64Updated 2 years ago
- A list of queries and actions that I repeat over and over again☆64Updated 4 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆59Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 3 years ago
- Scripts and tools for AWS Pentest☆51Updated 3 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆41Updated last year
- ☆69Updated 2 years ago
- ☆43Updated 4 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 3 years ago
- AWS Security Checks☆36Updated 6 years ago
- Vulnerability☆28Updated 3 weeks ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆19Updated 9 months ago
- A XSS mind map ;)☆56Updated 8 years ago
- Kubernetes Scanner☆41Updated 2 years ago
- A lab to play with authentication and authorisation problems☆90Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated last year
- First iteration of ML based Feedback WAF☆54Updated 6 months ago
- Burp Suite extension to passively scan for applications revealing server error messages☆64Updated 9 months ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆69Updated 7 months ago
- Weaponizing Live CT logs for automated monitoring of assets☆132Updated 3 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 3 months ago
- A compilation of network scanning strategies to find vulnerable devices☆71Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆95Updated 9 months ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆56Updated 4 years ago