Using machine learning to detect malware in encrypted TLS traffic metadata
☆17May 5, 2021Updated 4 years ago
Alternatives and similar repositories for tls-mal-detect
Users that are interested in tls-mal-detect are comparing it to the libraries listed below
Sorting:
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- ☆27Jun 17, 2025Updated 8 months ago
- A Low-Impact Internal Latency Measurement Tool for OpenAirInterface☆11Sep 13, 2023Updated 2 years ago
- Official implementation of the paper "From Optimization to Generalization: Fair Federated Learning against Quality Shift via Inter-Client…☆10Mar 13, 2025Updated 11 months ago
- Python library to get the Alexa rank of the domain of any URL☆10Jan 28, 2013Updated 13 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- ☆13Mar 22, 2024Updated last year
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Nov 8, 2020Updated 5 years ago
- This is a basic series of bash scripts that will build and configure a new NetBox instance per the official documentation.☆13Oct 15, 2025Updated 4 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Dec 5, 2020Updated 5 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- This is the our implementation for the paper: Exploring Mixed Information Flow for Cross-domain Sequential Recommendations☆12Aug 17, 2020Updated 5 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆16Feb 6, 2021Updated 5 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- ITU Artificial Intelligence/Machine Learning in 5G Challenge Site-Specific Channel Estimation with Hybrid MIMO Architectures Neel Kanth K…☆12Oct 24, 2020Updated 5 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆25Nov 26, 2025Updated 3 months ago
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 6 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆19Jun 15, 2020Updated 5 years ago
- ☆15Nov 29, 2020Updated 5 years ago
- ☆16Mar 16, 2021Updated 4 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- using deep learning to classify the encrypted network traffic☆169Dec 16, 2020Updated 5 years ago
- (l)user friendly WinDBG theme.☆19Mar 16, 2019Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- The source code of the paper "5G MIMO-CSI: a data generator configuring to 5G NR channel standard and its application" is provided in the…☆25Nov 16, 2021Updated 4 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- ☆29Nov 15, 2022Updated 3 years ago
- Peach Fuzzer PIT Files☆21Aug 12, 2013Updated 12 years ago
- This is the open source version of vulnerable.codes platform.☆28Apr 17, 2025Updated 10 months ago
- 🔬 [ECML-PKDD'24] This is the source code and baselines of our paper FedHCDR: Federated Cross-Domain Recommendation with Hypergraph Signa…☆25May 28, 2024Updated last year
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆24Mar 3, 2023Updated 3 years ago
- ☆24Oct 30, 2024Updated last year
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Aug 8, 2020Updated 5 years ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆44Mar 6, 2025Updated 11 months ago