
Maltrail: A System for Detecting Malicious Traffic
Maltrail is a system designed to detect malicious traffic. It uses publicly available blacklists, static trails from various antivirus (AV) reports, and custom user-defined lists to identify malicious and suspicious activities. This includes monitoring domain names, URLs, IP addresses, and HTTP User-Agent header values.
It also employs advanced heuristic mechanisms for threat detection
It also uses advanced heuristic mechanisms to identify unknown threats.
Other AI Tools

OWASP Foundation
Advanced vulnerability assessment tool for gaining visibility and preventing cyber attacks.
Details
Visit site

OWASP Joomla Vulnerability Scanner
An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.
Details
Visit site

OWASP Honeypot
Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.
Details
Visit site

OWASP TOP 10 Presentation
Vulnerability scanner for Linux/FreeBSD, written in Go, agent-less, informs users of vulnerabilities related to the system and affected servers.
Details
Visit site

OWASP Bricks
Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.
Details
Visit site

OWASP Application Security Wiki
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
Details
Visit site