dns tunnel dectect with CNN
☆63Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for dns_tunnel_dectect_with_CNN
Users that are interested in dns_tunnel_dectect_with_CNN are comparing it to the libraries listed below
Sorting:
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- 通过pcap文件生成描述网络传输报文的文本文件☆16Dec 22, 2017Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- ☆28Jul 18, 2020Updated 5 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43May 30, 2019Updated 6 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- ☆270Aug 25, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago
- ml webshellgg project☆38Nov 29, 2018Updated 7 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆113Sep 25, 2018Updated 7 years ago
- ☆18Aug 2, 2018Updated 7 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- machine learning for security☆77Mar 15, 2020Updated 5 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆60Aug 4, 2017Updated 8 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Record some Vulnerabilities☆44Nov 19, 2022Updated 3 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- ☆153Jun 19, 2017Updated 8 years ago
- 一个基于docker的安全培训系统☆60Mar 15, 2021Updated 4 years ago
- 使用LSTM模型检测DGA域名☆42Dec 30, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Windows Event Forwarding for Active Directory Security Logs☆29Jun 28, 2016Updated 9 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago