sdnewhop / AISecLinks
Cybersecurity of Machine Learning and Artificial Intelligence
☆69Updated 3 years ago
Alternatives and similar repositories for AISec
Users that are interested in AISec are comparing it to the libraries listed below
Sorting:
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- ☆72Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆130Updated 5 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- ☆90Updated 3 years ago
- A list of queries and actions that I repeat over and over again☆65Updated 5 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Updated 5 years ago
- Python resource library for creating security related tooling☆79Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 5 years ago
- Curated lists of InfoSec on Twitter. Find out who's awesome to follow!☆92Updated 4 years ago
- Source for Pentester Land☆39Updated 3 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- Perform CVE lookup on cvedetails.com☆27Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- A lab to play with authentication and authorisation problems☆98Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Vulnerability☆32Updated 2 months ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 5 years ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆60Updated 3 weeks ago
- ☆72Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆49Updated 3 years ago
- ☆54Updated last year
- ☆48Updated 5 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Updated last year
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆144Updated 2 years ago
- ☆44Updated 4 years ago