ExtraHop / DGA-Detection-Training-DatasetLinks
☆11Updated last year
Alternatives and similar repositories for DGA-Detection-Training-Dataset
Users that are interested in DGA-Detection-Training-Dataset are comparing it to the libraries listed below
Sorting:
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- ☆42Updated 8 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆75Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- NOVA: The Prompt Pattern Matching☆164Updated last month
- ☆303Updated last month
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- ☆74Updated last month
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 10 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 11 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆248Updated 4 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated last year
- ☆113Updated 3 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆47Updated last week
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆110Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- source code for the offsecml framework☆41Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- LLM Testing Findings Templates☆72Updated last year
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆35Updated 7 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆31Updated last month
- ☆94Updated 3 weeks ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆40Updated 2 years ago