This is the final proejct for EE 379K: Enterprise Network Security. We provide a script that takes in a SQL payload and returns an obfuscated payload. The code can be run as follows:
python3 obfuscator.py [command]
where command is the payload. The script will print the obfuscated payload to the console.
The notebooks folder contains our train/test pipelines for our models. The data folder contains the data used to create our results contained in the graphs folder.