Detection of malicious domains via character co-occurrence analysis in URL's.
☆11Mar 22, 2016Updated 10 years ago
Alternatives and similar repositories for malware-domain-detection
Users that are interested in malware-domain-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Oct 2, 2020Updated 5 years ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Scripts and queries to support the deployment of netflow data collection and analysis☆11Jan 10, 2015Updated 11 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Demo Spree+Ionic Android/iOS App☆12Jun 4, 2015Updated 10 years ago
- IntelliJ IDEA Settings☆12Oct 10, 2017Updated 8 years ago
- Docker/k8s-friendly Ghidra server☆29Jun 4, 2019Updated 6 years ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- Example application to show how to do file upload in vanilla Rails 4.☆11Nov 12, 2016Updated 9 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- Human name parser based on JavaScrip-Name-Parser by Josh Fraser.☆12May 4, 2015Updated 10 years ago
- ☆29May 4, 2016Updated 9 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- The homework of Web Security☆21Nov 14, 2018Updated 7 years ago
- Django site with user registration functionality powered by Userena.☆17Sep 22, 2013Updated 12 years ago
- A tool for building lambda function images or zips via Docker☆19Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Facet Search interface for MEMEX.☆13Feb 26, 2015Updated 11 years ago
- A CLI tool that scans through a directory and organizes all loose files into folders by file type.☆10Jul 27, 2021Updated 4 years ago
- A simple python wrapper for NASA's SPICE-framework☆13Mar 19, 2016Updated 10 years ago
- An implementation of the prediction strength algorithm from Tibshirani, Walther, Botstein, and Brown's "Cluster validation by prediction …☆18Feb 17, 2011Updated 15 years ago
- ☆14Oct 19, 2018Updated 7 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Munin plugin for Tor, moved to https://github.com/munin-monitoring/contrib/blob/master/plugins/tor/tor_☆14May 1, 2020Updated 5 years ago
- SBHacks III (1/20/17-1/22/17): Won 2nd Place and MLH #HackHarassment Challenge, featured on DevPost's Staff Picks, Chrome extension meant…☆12Sep 5, 2017Updated 8 years ago
- A spring boot validation library from laravel.☆12Sep 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A rotating socks proxy using Tor, Delegate and Haproxy☆27Nov 6, 2014Updated 11 years ago
- A simple (and rather ad-hoc) port scanner for Tor hidden services.☆28Mar 5, 2015Updated 11 years ago
- 日志可视化进阶☆13May 8, 2017Updated 8 years ago
- Information Propagation in a Social Network☆28Sep 10, 2011Updated 14 years ago
- This is a python simple tool for generating charts for ROC curve☆25Sep 22, 2010Updated 15 years ago
- $5 Cyber Weapons & How to Use Them☆11Jul 25, 2022Updated 3 years ago
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago