ExtraHop / DGA-Detection-Training-Dataset
☆11Updated last year
Alternatives and similar repositories for DGA-Detection-Training-Dataset:
Users that are interested in DGA-Detection-Training-Dataset are comparing it to the libraries listed below
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆51Updated 4 months ago
- ☆37Updated 2 months ago
- ☆70Updated last month
- Modular web-application honeypot platform built using go and gin☆56Updated 9 months ago
- source code for the offsecml framework☆37Updated 8 months ago
- ☆16Updated 3 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆93Updated last year
- ☆102Updated 9 months ago
- ☆11Updated last year
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆23Updated this week
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated 11 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 10 months ago
- ☆32Updated 3 months ago
- ☆84Updated 2 weeks ago
- ☆36Updated 2 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆209Updated 5 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 5 months ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆12Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆46Updated this week
- ☆27Updated 2 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆109Updated this week
- InfoSec OpenAI Examples☆19Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 10 months ago
- Mapping of open-source detection rules and atomic tests.☆126Updated last month
- Signature based honeypot detector tool written in Golang☆89Updated 2 months ago