dns tunnel dectect with CNN
☆63Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for dns_tunnel_dectect_with_CNN
Users that are interested in dns_tunnel_dectect_with_CNN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- Outlier Detection to detect DNS Tunnelling☆11Oct 8, 2018Updated 7 years ago
- 通过pcap文件生成描述网络传输报文的文本文件☆16Dec 22, 2017Updated 8 years ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆30Sep 23, 2022Updated 3 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- ☆269Aug 25, 2018Updated 7 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆113Sep 25, 2018Updated 7 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ml webshellgg project☆38Nov 29, 2018Updated 7 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago
- Sample DGA classifier☆127Jul 16, 2015Updated 10 years ago
- ☆28Jul 18, 2020Updated 5 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43May 30, 2019Updated 6 years ago
- machine learning for security☆77Mar 15, 2020Updated 6 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- 使用LSTM模型检测DGA域名☆42Dec 30, 2019Updated 6 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- 企业级安全智能化实践☆70Mar 16, 2022Updated 4 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Peach Fuzzer 3.x☆23Apr 7, 2016Updated 9 years ago
- 基于神经网络的 PHP webshell检测器,目前有Attention与LSTM两种网络结构,以OPCODE作特征基础☆11Nov 28, 2019Updated 6 years ago
- 自身学习的安全数据科学和算法的学习资料☆635Jul 26, 2020Updated 5 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- ☆172Aug 29, 2018Updated 7 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆60Aug 4, 2017Updated 8 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago