Suspicious DGA from PDNS and Sandbox.
☆186Jul 12, 2022Updated 3 years ago
Alternatives and similar repositories for DGA
Users that are interested in DGA are comparing it to the libraries listed below
Sorting:
- Some results of my DGA reversing efforts☆687Sep 28, 2025Updated 5 months ago
- ☆270Aug 25, 2018Updated 7 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆223Jul 31, 2017Updated 8 years ago
- The python client of passivedns.cn☆97Dec 5, 2018Updated 7 years ago
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- A collection of known Domain Generation Algorithms☆67Apr 4, 2016Updated 9 years ago
- Sample DGA classifier☆128Jul 16, 2015Updated 10 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Sep 28, 2016Updated 9 years ago
- HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis an…☆747Apr 7, 2023Updated 2 years ago
- Automatically compiled list of file hashes associated with the IoT malware Hajime and its components.☆14Mar 30, 2018Updated 7 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- 手工盲注辅助注入工具☆34Sep 16, 2018Updated 7 years ago
- Customised Nessus audit scripts☆15Sep 21, 2020Updated 5 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆30Aug 23, 2018Updated 7 years ago
- ml webshellgg project☆38Nov 29, 2018Updated 7 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- ☆106Feb 2, 2018Updated 8 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,647Jan 1, 2024Updated 2 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- Map IPv4 addresses to Hilbert curves for data visualization☆23Apr 25, 2012Updated 13 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- APTnotes data☆1,773Dec 16, 2024Updated last year
- ☆98Feb 21, 2019Updated 7 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆960Aug 28, 2025Updated 6 months ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- Attack Detection☆1,358Aug 31, 2022Updated 3 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- 本项目致力于收集网上公开来源的威胁情报,主要关注信誉类威胁情报(如IP/域名等),以及事件类威胁情报。☆313Oct 28, 2017Updated 8 years ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,262Jul 8, 2023Updated 2 years ago
- Will to be a niubility scan-framework☆519Jul 1, 2025Updated 8 months ago
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆603Apr 1, 2021Updated 4 years ago