ExtraHop / DGA-Detection-Training-DatasetLinks
☆11Updated last year
Alternatives and similar repositories for DGA-Detection-Training-Dataset
Users that are interested in DGA-Detection-Training-Dataset are comparing it to the libraries listed below
Sorting:
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- ☆40Updated 5 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- An index of publicly available and open-source threat detection rulesets.☆112Updated last month
- ☆104Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 8 months ago
- NOVA: The Prompt Pattern Matching☆114Updated last month
- ☆71Updated 4 months ago
- ☆92Updated 3 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- ☆33Updated 6 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 5 months ago
- Knowledge base on cybercriminal concealment techniques☆69Updated last month
- ☆36Updated 5 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 7 months ago
- ☆25Updated 2 years ago
- ☆48Updated last week
- Examine Chrome extensions for security issues☆84Updated 3 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- ☆37Updated 6 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- source code for the offsecml framework☆40Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆74Updated last week
- ☆142Updated this week
- ☆12Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated last week
- Repo for experimenting and testing MCP server builds for CTI-related research.☆26Updated 3 weeks ago