Webhawk/Catch helps automatically finding web attack traces in logs
☆16Aug 12, 2025Updated 8 months ago
Alternatives and similar repositories for unsupervised-learning-attack-detection-webhawk-catch
Users that are interested in unsupervised-learning-attack-detection-webhawk-catch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes for my CISSP study☆10Aug 5, 2022Updated 3 years ago
- IRIS Module for Wazuh-Indexer Searching☆11Nov 24, 2023Updated 2 years ago
- Learning tutorial for machine learning beginners☆17May 14, 2022Updated 3 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- Free and open implementation of the IEC 60870-6 TASE.2 protocol☆20Apr 29, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆14Feb 12, 2026Updated 2 months ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- Open Source SIEM Stack☆29Oct 15, 2024Updated last year
- ☆10Feb 3, 2021Updated 5 years ago
- ☆19Mar 29, 2022Updated 4 years ago
- This is a script to deploy a cluster with Apache Hadoop and Apache Spark + Apache Hive in distributed mode using Docker as infrastructure…☆26Feb 25, 2026Updated last month
- Argon2 key derivation for Ruby☆11Apr 4, 2026Updated last week
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- RGB <-> Lab color space conversion☆17Jul 30, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 11 years ago
- Server prepared for SSRF post exploitation, javascript exploits and open redirect.☆13Jan 4, 2023Updated 3 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- A cryptographic hash function faster than MD5, SHA-1, SHA-2, and SHA-3☆13Feb 14, 2022Updated 4 years ago
- Dll injection for executable file☆17Jul 22, 2016Updated 9 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Swift bindings for libscrypt☆15Mar 21, 2024Updated 2 years ago
- Spongebob-themed cypher injection playground☆13Jun 4, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fetches security vulnerabilities and creates pip-constraints based on them.☆12Jan 27, 2025Updated last year
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- A tool to extract RTTI information from Delphi executables, written in pure Python☆23Mar 11, 2020Updated 6 years ago
- Repository of creating different example suricata data sets☆36Jan 2, 2019Updated 7 years ago
- Example of how you can create your own dojo☆13Sep 2, 2025Updated 7 months ago
- Plugin for Frida in Binary Ninja☆27May 19, 2021Updated 4 years ago
- ☆23Jun 17, 2024Updated last year
- An index of blocklists and a tool to extract CIDRs to use in firewalls and network appliances.☆11Aug 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- extract tld info from url☆14Jan 2, 2025Updated last year
- Code repo for https://benhoyt.com/writings/io-is-no-longer-the-bottleneck/☆14Nov 26, 2022Updated 3 years ago
- An open-source music transcription application.☆12Sep 9, 2023Updated 2 years ago
- Synology image files checksum calculator☆13Jan 28, 2013Updated 13 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Feb 8, 2023Updated 3 years ago
- This repo has been migrated to https://code.larus.se/lmas/Damerau-Levenshtein☆11Jul 21, 2023Updated 2 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago