ExtraHop / DGA-Detection-Training-DatasetLinks
☆11Updated 2 years ago
Alternatives and similar repositories for DGA-Detection-Training-Dataset
Users that are interested in DGA-Detection-Training-Dataset are comparing it to the libraries listed below
Sorting:
- ☆42Updated 9 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆77Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- source code for the offsecml framework☆41Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- NOVA: The Prompt Pattern Matching☆175Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated 9 months ago
- ☆41Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 6 months ago
- ☆74Updated 2 months ago
- ☆54Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆91Updated 3 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated last week
- ☆309Updated last week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 4 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- ☆70Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- ☆38Updated 8 months ago
- An index of publicly available and open-source threat detection rulesets.☆125Updated 5 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams☆27Updated 2 months ago
- LLM Testing Findings Templates☆73Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆51Updated 10 months ago
- ☆163Updated last week
- Knowledge base on cybercriminal concealment techniques☆76Updated 4 months ago