Detection of malicious data exfiltration over DNS using Machine Learning techniques
☆13Jul 8, 2020Updated 5 years ago
Alternatives and similar repositories for DetExt
Users that are interested in DetExt are comparing it to the libraries listed below
Sorting:
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆30Sep 23, 2022Updated 3 years ago
- Active DSA preparation in Java | Organized by data structures & algorithms☆17Feb 8, 2026Updated 3 weeks ago
- This project has the source code for implementing the hospital management system using blockchain☆15Feb 24, 2022Updated 4 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- 去哪儿网爬虫(景区与景区评论)☆10Jul 1, 2019Updated 6 years ago
- 五子棋人机博弈,极大极小值,剪枝,启发式搜索☆10Nov 7, 2020Updated 5 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Repo for everyone who wants a machine learning basic☆10May 1, 2020Updated 5 years ago
- It's an experiment based on 09 KDD paper, Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs☆10Jan 8, 2019Updated 7 years ago
- Plants Disease Detection using ML☆10Oct 21, 2022Updated 3 years ago
- 大数据生态解决方案基础平台: 搜索系统、公共系统、任务管理系统、数据binlog采集、基础爬虫系统、数据传输系统、运维告警系统、APM、报表系统☆11Jan 25, 2021Updated 5 years ago
- 淘宝,京东,苏宁Scrapy爬虫☆10Dec 8, 2022Updated 3 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- Outlier Detection to detect DNS Tunnelling☆11Oct 8, 2018Updated 7 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated last month
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- The official implementation of paper "Drop-Activation: Implicit Parameter Reduction and Harmonious Regularization".☆10May 30, 2019Updated 6 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 6 months ago
- 京东爬虫,可以实现输入一个关键字后自动爬取相关的商品信息,也可以用于自定义爬取商品的评论。☆11Mar 23, 2018Updated 7 years ago
- Generate large textual corpora for almost any language by crawling the web☆13Feb 17, 2024Updated 2 years ago
- ios游戏APP评论爬虫。crawl app comments on amazon && appannie.☆12Apr 6, 2016Updated 9 years ago
- My custom Archlinux with Hyprland config with Installation script☆15May 12, 2025Updated 9 months ago
- Applied unsupervised machine learning algorithms (K-Means Clustering and Isolation Forest) on time series data collected from an Air Hand…☆14May 6, 2019Updated 6 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- This repository contains the source code for a network traffic occlusion framework presented at the 2025 IEEE Symposium on Security and P…☆27May 15, 2025Updated 9 months ago
- ☆12Jul 19, 2024Updated last year
- ☆10Mar 14, 2022Updated 3 years ago
- 基于关键字的配置化电商爬虫,目前已实现京东和苏宁(淘宝反爬太严重,因为没有使用selenium)☆12Jun 3, 2020Updated 5 years ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- In this work different types of network traffic such as: email, chat, browsing etc were classified using time related features. The main …☆12Mar 14, 2020Updated 5 years ago