wallarm / wallnet
Open-source code to support BSides 2019's talk: Bye-Bye False Positives: Using AI to Improve Detection
☆21Updated last year
Alternatives and similar repositories for wallnet:
Users that are interested in wallnet are comparing it to the libraries listed below
- Signature-free approach library to detect injection and commanding attacks☆86Updated 3 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆108Updated 2 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 2 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- Vulnerable Java based Web Application☆31Updated 5 years ago
- Vulnerability Information Aggregator for CVEs☆118Updated 5 years ago
- Web Input Vector Extractor Teaser☆131Updated 3 years ago
- Machine Learning WAF Based☆92Updated 4 years ago
- Python script for monitoring vulnerabilities database☆25Updated 4 years ago
- ☆55Updated 8 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆106Updated 5 years ago
- Webshell Detection Based on Deep Learning☆11Updated 6 years ago
- ☆33Updated 8 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- ☆58Updated last month
- ☆13Updated 4 years ago
- ZAP add-on containing the web-backdoors and attack files from FuzzDB☆18Updated 3 weeks ago
- Externalize Java application access to protected resources as log messages.☆40Updated 9 months ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25Updated 7 years ago
- Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop…☆16Updated 8 years ago
- IronBee Rules☆19Updated 11 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Some of the presentations given by me☆18Updated 3 months ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- ☆13Updated 2 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 6 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆29Updated 6 years ago
- A tool for detecting regular expression denial-of-service vulnerabilities in Android apps.☆33Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago