ExtraHop / DGA-Detection-Training-DatasetLinks
☆14Updated 2 years ago
Alternatives and similar repositories for DGA-Detection-Training-Dataset
Users that are interested in DGA-Detection-Training-Dataset are comparing it to the libraries listed below
Sorting:
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆61Updated 2 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- ☆44Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Updated 6 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆109Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- ☆74Updated 4 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆102Updated 3 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Updated 2 weeks ago
- LLM Testing Findings Templates☆75Updated last year
- ☆38Updated last year
- ☆169Updated 4 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆49Updated 2 years ago
- ☆23Updated last year
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Updated 2 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆58Updated last year
- ☆139Updated last week
- Documentation and guidance to practice secure coding for various PLC vendors☆41Updated 2 years ago
- Create honeypots for cloud environments☆109Updated 4 months ago
- Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams☆39Updated 6 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- ☆285Updated 5 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year