ExtraHop / DGA-Detection-Training-DatasetLinks
☆11Updated 2 years ago
Alternatives and similar repositories for DGA-Detection-Training-Dataset
Users that are interested in DGA-Detection-Training-Dataset are comparing it to the libraries listed below
Sorting:
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆57Updated 2 months ago
- ☆43Updated 10 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆52Updated last week
- ☆74Updated 3 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆103Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- NOVA: The Prompt Pattern Matching☆25Updated last week
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆92Updated last week
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- An index of publicly available and open-source threat detection rulesets.☆128Updated 6 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆253Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆83Updated last week
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆208Updated last week
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 7 months ago
- ☆91Updated last week
- source code for the offsecml framework☆42Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- ☆268Updated last month
- Rules shared by the community from 100 Days of YARA 2025☆36Updated 9 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆125Updated last month
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆52Updated 11 months ago
- Knowledge base on cybercriminal concealment techniques☆78Updated 5 months ago
- Mapping of open-source detection rules and atomic tests.☆178Updated 9 months ago
- Create honeypots for cloud environments☆71Updated 3 weeks ago
- A very simple open source implementation of Google's Project Naptime☆172Updated 7 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆79Updated last month
- Repository of tools and resources for analyzing Docker containers☆70Updated last year
- ☆320Updated last month