sdnewhop / AISecLinks
Cybersecurity of Machine Learning and Artificial Intelligence
☆69Updated 3 years ago
Alternatives and similar repositories for AISec
Users that are interested in AISec are comparing it to the libraries listed below
Sorting:
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- ☆72Updated 4 years ago
- ☆90Updated 3 years ago
- ☆53Updated 10 months ago
- Perform CVE lookup on cvedetails.com☆27Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Updated 5 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Updated last year
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- A list of queries and actions that I repeat over and over again☆65Updated 5 years ago
- 📚A curated list of product security resources.☆21Updated 5 months ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Vulnerability☆32Updated 3 weeks ago
- using ML models for red teaming☆44Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Source for Pentester Land☆38Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Updated 8 months ago
- Python resource library for creating security related tooling☆79Updated last year
- ☆36Updated 5 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago