aktaion
Exploit detector
A lightweight tool for detecting exploits and generating policies based on micro behaviors of malicious activities
Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research
142 stars
23 watching
48 forks
Language: Python
last commit: almost 6 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool designed to emulate browser behavior and detect vulnerabilities in web-based exploits | 163 |
| A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 |
| Detects malicious network and host activity using Yara, Snort, and ClamAV signatures. | 213 |
| Develops a survival analysis-based model to detect fraud early | 34 |
| A tool designed to detect and block specific Apache Struts vulnerabilities by mimicking a web application | 72 |
| Detects KRACK attacks and disconnects client devices from the network. | 181 |
| An IDA PRO plugin to analyze binaries for potential vulnerabilities using AI-powered decompilation and static analysis | 353 |
| Detects vulnerability in JWT tokens by injecting an unexpected key ID field and generating tokens with one-letter secrets | 51 |
| Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
| An extension that detects and highlights insecure HTML links in web pages | 5 |
| A tool to detect malicious activities on Exchange servers by scanning mailboxes and forms for signs of exploitation | 93 |
| An algorithm for detecting spam reviews using reinforcement learning to train robust detectors against strategically synthesized attacks. | 118 |
| Develops and evaluates machine learning models for detecting financial fraud | 195 |
| An AI-powered tool that detects whether news articles are fake or not | 8 |
| Detects and analyzes command injection vulnerabilities in iRules written in the Tool Command Language (Tcl), allowing for identification of potential security flaws. | 5 |