ExtraHop / DGA-Detection-Training-Dataset
☆11Updated last year
Alternatives and similar repositories for DGA-Detection-Training-Dataset
Users that are interested in DGA-Detection-Training-Dataset are comparing it to the libraries listed below
Sorting:
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- ☆39Updated 5 months ago
- ☆36Updated 4 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- An index of publicly available and open-source threat detection rulesets.☆72Updated last month
- NOVA: The Prompt Pattern Matching☆80Updated 2 weeks ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago
- ☆33Updated 6 months ago
- ☆89Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- ☆104Updated 11 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- Knowledge base on cybercriminal concealment techniques☆64Updated last week
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year
- ☆16Updated last month
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆72Updated this week
- Mapping of open-source detection rules and atomic tests.☆163Updated 3 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆95Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated 3 weeks ago
- OWASP Top 10 Infrastructure Security Risks☆34Updated 4 months ago
- ☆40Updated last week
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 7 months ago
- source code for the offsecml framework☆40Updated 11 months ago
- ☆17Updated 6 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆100Updated 7 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆61Updated last month
- ☆71Updated 3 months ago