vladan-stojnic / ML-based-WAF
Simple machine learning based web application firewall (WAF) created in python
☆57Updated last year
Alternatives and similar repositories for ML-based-WAF:
Users that are interested in ML-based-WAF are comparing it to the libraries listed below
- ☆74Updated 7 years ago
- Machine Learning WAF Based☆94Updated 4 years ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆29Updated 9 months ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆46Updated 4 years ago
- Avoid malicious payloads in your webapp with machine learning!☆19Updated 2 years ago
- ☆26Updated 4 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆185Updated last year
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 6 years ago
- Suricata rules for the new critical vulnerabilities☆81Updated 4 years ago
- Web Application Firewall Benchmark☆12Updated 2 years ago
- SQL injection detection engine built on of SQL tokenizing and syntax analysis written in C☆60Updated 4 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- A logic-based enterprise network security analyzer☆124Updated 2 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 6 months ago
- Anomaly detection based on DNS traffic analysis☆52Updated 4 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆109Updated 2 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- Machine learning driven web application firewall to detect malicious queries with high accuracy.☆424Updated 7 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- ☆82Updated 4 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- ☆37Updated 7 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- Vulnerability Information Aggregator for CVEs☆120Updated 5 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27Updated 5 years ago
- A parser for the SecRules Langue☆22Updated 3 months ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- a Machine Learning powered CSRF attacks finding tool☆27Updated 6 years ago