ExtraHop / DGA-Detection-Training-DatasetLinks
☆11Updated last year
Alternatives and similar repositories for DGA-Detection-Training-Dataset
Users that are interested in DGA-Detection-Training-Dataset are comparing it to the libraries listed below
Sorting:
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 5 months ago
- ☆42Updated 8 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated 2 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆68Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- ☆38Updated 7 months ago
- NOVA: The Prompt Pattern Matching☆154Updated 2 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆244Updated 3 months ago
- ☆74Updated 2 weeks ago
- ☆290Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆108Updated 2 weeks ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- ☆62Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- Deep Linux runtime visibility meets Wireshark☆292Updated 3 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 5 months ago
- ATLAS tactics, techniques, and case studies data☆78Updated 3 months ago
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 10 months ago
- ☆256Updated 6 months ago
- source code for the offsecml framework☆41Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆50Updated 9 months ago
- A very simple open source implementation of Google's Project Naptime☆163Updated 4 months ago
- ☆146Updated 2 months ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆27Updated 5 months ago
- Knowledge base on cybercriminal concealment techniques☆76Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆120Updated 3 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆184Updated this week
- ☆41Updated 8 months ago