The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.
☆17Apr 26, 2021Updated 4 years ago
Alternatives and similar repositories for malicious_domains_dga_detection
Users that are interested in malicious_domains_dga_detection are comparing it to the libraries listed below
Sorting:
- Malicious domain name detection based on tensorflow☆36Jan 6, 2018Updated 8 years ago
- Domain Generation Algorithms research papers, datasets and code☆15May 17, 2020Updated 5 years ago
- DGA Detection with ML and DL☆52Sep 9, 2019Updated 6 years ago
- ☆10Sep 25, 2024Updated last year
- 《Redis 命令速查表》☆14Nov 6, 2017Updated 8 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Based on: https://arxiv.org/abs/2202.07453☆11Jan 15, 2023Updated 3 years ago
- Subgraphormer: Unifying Subgraph GNNs and Graph Transformers via Graph Products (ICML 2024)☆11Jul 13, 2024Updated last year
- heterogeneous graph attention network for SMEs bankruptcy prediction☆12Feb 26, 2021Updated 5 years ago
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆10Jun 11, 2018Updated 7 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- ☆12Sep 12, 2020Updated 5 years ago
- A LSTM based framework for handling multiclass imbalance in DGA botnet detection☆22Sep 10, 2020Updated 5 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Antivirus engine that allows you to create your own anti-virus☆11Nov 2, 2012Updated 13 years ago
- dataset of encrypted network traffic☆12Apr 16, 2018Updated 7 years ago
- ☆18Feb 22, 2022Updated 4 years ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- A fully original Windows anti-virus client from HonestRepair using the same custom antivirus engine as our Cloud.☆16Dec 19, 2019Updated 6 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- ☆12Feb 25, 2018Updated 8 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- c语言学习,练习代码,资料整理☆15Mar 20, 2023Updated 3 years ago
- ☆16Jun 22, 2022Updated 3 years ago
- Crack any ftp server by using FTP Crack Elite tool kit, ftp bruteforce☆12Nov 7, 2017Updated 8 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- The codes of IJCAI 2021 paper "Temporal Heterogeneous Information Network Embedding"☆15Jun 10, 2022Updated 3 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆19May 6, 2024Updated last year