Detection of malicious data exfiltration over DNS using Machine Learning techniques
☆13Jul 8, 2020Updated 5 years ago
Alternatives and similar repositories for DetExt
Users that are interested in DetExt are comparing it to the libraries listed below
Sorting:
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆30Sep 23, 2022Updated 3 years ago
- Outlier Detection to detect DNS Tunnelling☆11Oct 8, 2018Updated 7 years ago
- This project has the source code for implementing the hospital management system using blockchain☆15Feb 24, 2022Updated 4 years ago
- Generate large textual corpora for almost any language by crawling the web☆13Feb 17, 2024Updated 2 years ago
- Plants Disease Detection using ML☆10Oct 21, 2022Updated 3 years ago
- Integration between Rocket.Chat and the RASA Chatbot platform☆17Jul 31, 2023Updated 2 years ago
- The official implementation of paper "Drop-Activation: Implicit Parameter Reduction and Harmonious Regularization".☆10May 30, 2019Updated 6 years ago
- ☆12Jul 19, 2024Updated last year
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Applied unsupervised machine learning algorithms (K-Means Clustering and Isolation Forest) on time series data collected from an Air Hand…☆14May 6, 2019Updated 6 years ago
- Repo for everyone who wants a machine learning basic☆10May 1, 2020Updated 5 years ago
- Active DSA preparation in Java | Organized by data structures & algorithms☆17Mar 14, 2026Updated last week
- ☆10Mar 14, 2022Updated 4 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- dga classification with fasttext☆13Oct 29, 2018Updated 7 years ago
- Graph clustering and Node embeddings with word2vec☆14Mar 2, 2019Updated 7 years ago
- VilNE Scanner☆19Oct 19, 2023Updated 2 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Jan 14, 2019Updated 7 years ago
- Webzen Data Analysis Tool Library☆21Jul 9, 2018Updated 7 years ago
- ☆18Jan 15, 2021Updated 5 years ago
- Convert a collection of eml files to CSV☆20May 6, 2016Updated 9 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Tensorflow version of the AdaMod Optimizer☆11May 12, 2020Updated 5 years ago
- It's an experiment based on 09 KDD paper, Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs☆10Jan 8, 2019Updated 7 years ago
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 6 years ago
- Kaggle Titanic Top 3% Solution (301/11487)☆15Aug 10, 2019Updated 6 years ago
- This repository contains the source code associated with the method proposed by Tolomei et al. in their KDD 2017 research paper entitled …☆17May 21, 2019Updated 6 years ago
- Supplementary material for KDD 2018 workshop "DCSO: Dynamic Combination of Detector Scores for Outlier Ensembles"☆20Jan 26, 2019Updated 7 years ago
- Parser for Gmail exported emails in MBOX format.☆31Sep 30, 2019Updated 6 years ago
- Transfer Learning for Image-Based Malware Classification☆47Mar 1, 2022Updated 4 years ago
- My Solutions to Programming Assignments from the Improving Deep Neural Networks: Hyperparameter tuning, Regularization and Optimization c…☆11Jul 5, 2018Updated 7 years ago
- Machine Learning models from scratch with a better visualisation☆14Nov 23, 2023Updated 2 years ago
- ios游戏APP评论爬虫。crawl app comments on amazon && appannie.☆12Apr 6, 2016Updated 9 years ago
- Enumerate headers in markdown file☆13Jul 17, 2023Updated 2 years ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated 2 months ago
- Custom Named Entity Recognition with Spacy3☆31Dec 30, 2021Updated 4 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- ☆21Aug 31, 2019Updated 6 years ago
- Multi-class malware classification using Deep Learning☆76Oct 3, 2020Updated 5 years ago