ahlashkari / DoHLyzerView external linksLinks
DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.
☆72May 15, 2023Updated 2 years ago
Alternatives and similar repositories for DoHLyzer
Users that are interested in DoHLyzer are comparing it to the libraries listed below
Sorting:
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆12Jul 22, 2023Updated 2 years ago
- flowRecorder - a network traffic flow feature measurement tool☆21Jan 14, 2019Updated 7 years ago
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 2 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- ☆22Feb 14, 2020Updated 6 years ago
- In this work different types of network traffic such as: email, chat, browsing etc were classified using time related features. The main …☆12Mar 14, 2020Updated 5 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- Hexo Blog☆10Feb 7, 2025Updated last year
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 2 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 5 years ago
- tcp pcap to weka☆20Mar 5, 2017Updated 8 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- A collection of resources for security data☆41Nov 23, 2017Updated 8 years ago
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆22Jul 9, 2020Updated 5 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- Code for “FS-Net: A Flow Sequence Network For Encrypted Traffic Classification”☆117Jul 9, 2020Updated 5 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 9 years ago
- ☆24Mar 11, 2022Updated 3 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- Toolkit for processing PCAP file and transform into image of MNIST dataset☆256Jan 4, 2024Updated 2 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆163Sep 2, 2025Updated 5 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆30May 30, 2024Updated last year
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- ☆40Dec 10, 2021Updated 4 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆163Mar 27, 2025Updated 10 months ago
- Deep Learning models for network traffic classification☆758Jan 30, 2026Updated 2 weeks ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- database-course☆13Jan 6, 2023Updated 3 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- ☆14Apr 1, 2025Updated 10 months ago
- 五子棋人机博弈,极大极小值,剪枝,启发式搜索☆10Nov 7, 2020Updated 5 years ago