DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.
☆72May 15, 2023Updated 2 years ago
Alternatives and similar repositories for DoHLyzer
Users that are interested in DoHLyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Documentation and resources for deploying JupyterHub on Hadoop☆19Jul 16, 2019Updated 6 years ago
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆12Jul 22, 2023Updated 2 years ago
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 3 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Hexo Blog☆10Feb 7, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆676Dec 4, 2023Updated 2 years ago
- 支持自定义和扩展的流量捕捉工具☆17Feb 8, 2026Updated last month
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- ☆11Feb 22, 2024Updated 2 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- In this work different types of network traffic such as: email, chat, browsing etc were classified using time related features. The main …☆12Mar 14, 2020Updated 6 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆10Feb 7, 2017Updated 9 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- Anomaly detection based on DNS traffic analysis☆55Jul 30, 2020Updated 5 years ago
- A collection of resources for security data☆42Nov 23, 2017Updated 8 years ago
- A Behavior-Based Device Identification Method for the IoT☆60Feb 25, 2025Updated last year
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆41Dec 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- A pure Python ECMAScript parser and engine.☆18Feb 18, 2016Updated 10 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Feb 5, 2024Updated 2 years ago
- Deep Learning models for network traffic classification☆763Jan 30, 2026Updated last month
- ☆12Jan 12, 2023Updated 3 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆131Jul 20, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Notes about courses Machine Learning 2025 Spring by Hung-yi Lee☆26Sep 22, 2025Updated 6 months ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- Entropy clustering of IPv6 networks, see https://ipv6hitlist.github.io/☆13Sep 24, 2018Updated 7 years ago
- Code for the CVPR '23 paper, "Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning"☆10Jun 9, 2023Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year