Suspicious DGA from PDNS and Sandbox.
☆186Jul 12, 2022Updated 3 years ago
Alternatives and similar repositories for DGA
Users that are interested in DGA are comparing it to the libraries listed below
Sorting:
- Some results of my DGA reversing efforts☆687Sep 28, 2025Updated 5 months ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆224Jul 31, 2017Updated 8 years ago
- ☆270Aug 25, 2018Updated 7 years ago
- The python client of passivedns.cn☆97Dec 5, 2018Updated 7 years ago
- A collection of known Domain Generation Algorithms☆67Apr 4, 2016Updated 9 years ago
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- Sample DGA classifier☆127Jul 16, 2015Updated 10 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆30Aug 23, 2018Updated 7 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- A LSTM based framework for handling multiclass imbalance in DGA botnet detection☆22Sep 10, 2020Updated 5 years ago
- Automatically compiled list of file hashes associated with the IoT malware Hajime and its components.☆14Mar 30, 2018Updated 7 years ago
- ☆16Feb 25, 2022Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Sep 28, 2016Updated 9 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆55Sep 9, 2017Updated 8 years ago
- HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis an…☆748Apr 7, 2023Updated 2 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- DGA Detection with ML and DL☆52Sep 9, 2019Updated 6 years ago
- ☆15Jun 29, 2016Updated 9 years ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆26Jul 9, 2019Updated 6 years ago
- Ender of Fast-Flux malicious domains.☆26Nov 2, 2014Updated 11 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,643Jan 1, 2024Updated 2 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆964Feb 28, 2026Updated 3 weeks ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- APTnotes data☆1,777Dec 16, 2024Updated last year
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- Malicious traffic detection system☆8,329Updated this week
- Collection of AI and Security Papers☆27Apr 17, 2020Updated 5 years ago
- ☆11Jan 3, 2018Updated 8 years ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,267Jul 8, 2023Updated 2 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Jul 26, 2022Updated 3 years ago
- ml webshellgg project☆38Nov 29, 2018Updated 7 years ago
- Official VirusTotal plugin for IDA Pro☆181Feb 4, 2026Updated last month