WAVS: Web App Vulnerability Scanner [CS416 (Foundations of Network Security and Cryptography) Project]
☆12Apr 24, 2021Updated 4 years ago
Alternatives and similar repositories for WAVS
Users that are interested in WAVS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Graduation Project : ICS Vulnerability Scanner☆18May 24, 2016Updated 9 years ago
- The goal of this project is to create a simple Spring Boot REST API and secure it with Kong using the LDAP Authentication and Basic Authe…☆16Dec 11, 2025Updated 3 months ago
- Project of Data and System Security course (Master's Degree in Cybersecurity at University of Pisa)☆14Dec 14, 2020Updated 5 years ago
- App that generates a JSON file containing the details of various UI components from the screenshot of a wireframe. [Submission for Smart …☆21Feb 27, 2021Updated 5 years ago
- A simple crime management system, which stores and display data from MySQL database. It is a console based Java application.☆12Jan 2, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Steam Database Design and Game Recommendation System☆10Aug 9, 2022Updated 3 years ago
- Coding computer vision related algorithms from "scratch".☆15Jun 9, 2024Updated last year
- 5G assisted software defined vehicular network for cooperative data sharing☆11Oct 8, 2021Updated 4 years ago
- This project showcases a big data processing pipeline for cryptocurrency data using Hadoop, Spark Streaming, Kafka, MongoDB, and a React …☆12May 10, 2023Updated 2 years ago
- Queries related to creating an AI Email Assistant with MindsDB and GPT4.☆12Oct 17, 2024Updated last year
- ☆17Sep 2, 2025Updated 6 months ago
- A simple package designed to streamline the development of a zero-knowledge authentication system with Zupass tickets.☆15Feb 28, 2024Updated 2 years ago
- Cryptographic library written in JavaScript. Created at UZH as a part of an E-Voting project.☆14Jan 24, 2023Updated 3 years ago
- The objective of this project is to maintain a record of all the cyber-crime complaints reported by the victims and provide a platform fo…☆12Dec 4, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Final Year Project to train the model for Diabetes and Parkinson Prediction showcase with streamlit interface.☆16Jun 23, 2024Updated last year
- BabelInkCrypt is an open-source project that combines encryption, library of babel, and video making to create a secure infinite storage …☆22Sep 7, 2023Updated 2 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- 🗄A python+sqlite3 database management system using tkinter for a crime database🗄☆13Jan 9, 2021Updated 5 years ago
- CryptoKnight is a general purpose cryptography desktop app☆17Jan 12, 2018Updated 8 years ago
- Beginners guide to the top Machine Learning and Deep Learning Projects.☆17Jul 8, 2020Updated 5 years ago
- Super cipher cryptography project which uses three types of key such as numerical and alphabets for providing triple layer of security. F…☆22Jan 31, 2023Updated 3 years ago
- Developed a website to scan any web app. User enters the targeted URL in the website to find security vulnerabilities in the code and vis…☆16Feb 23, 2015Updated 11 years ago
- CSC503: Computer Network [CN] & CSL502: Computer Network Lab [CN Lab] | TE Semester V | Computer Engineering☆20Feb 20, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆14Apr 21, 2023Updated 2 years ago
- Mishky's AD Range & The Escalation Path from Hell, version 1.1☆19Feb 5, 2026Updated last month
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆15Dec 6, 2020Updated 5 years ago
- College Club Events Management System☆20Dec 13, 2021Updated 4 years ago
- Machine learning program that detects Parkinson's disease from patients voice using Support Vector Machine classifier.☆13Mar 16, 2022Updated 4 years ago
- Unveiling the Tremors, A Reliable Algorithm with 83% Accuracy for Detecting Parkinson's Disease through Spiral/Wave Sketch Images.☆15Mar 22, 2025Updated last year
- A trust inference model on the hyperledger that is attack proof for communication in ephemeral networks such as vehicular adhoc networks …☆17Sep 4, 2020Updated 5 years ago
- 👋 Hey there new grad🎉! We've put together a collection of full-time job openings for SWE tech roles in 2024 in Europe! 🚀☆12Dec 3, 2023Updated 2 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Maven training - time tracker project☆21Apr 10, 2024Updated last year
- This repository will track my practice programs in jjava☆14Apr 23, 2024Updated last year
- Chat Application using Flask and SocketIO☆33Jun 13, 2021Updated 4 years ago
- routing-implementation in SDN based on switch processing delay and remaining bandwidth☆21Feb 3, 2025Updated last year
- jQuery: Content switching made easy☆154May 27, 2014Updated 11 years ago
- ☆17Sep 11, 2020Updated 5 years ago
- ☆15Jul 8, 2023Updated 2 years ago