Detection of malicious domains via character co-occurrence analysis in URL's.
☆11Mar 22, 2016Updated 10 years ago
Alternatives and similar repositories for malware-domain-detection
Users that are interested in malware-domain-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Oct 2, 2020Updated 5 years ago
- Domain name classifier looking for good vs. possibly malicious providers☆34May 4, 2018Updated 7 years ago
- A Dataset for the task of Malicious URL Detection☆20Jan 18, 2018Updated 8 years ago
- Domain Graph core library☆17Jan 14, 2023Updated 3 years ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Group review spammer detection☆10Sep 9, 2019Updated 6 years ago
- ☆22Feb 5, 2026Updated 2 months ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Jan 14, 2022Updated 4 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Builds a hosts file and an Unbound config for blocking advertising and malware domains.☆10Jan 3, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Research project on glyph-based Chinese character embedding. Preparing for EMNLP 2019☆11Mar 18, 2019Updated 7 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Docker/k8s-friendly Ghidra server☆29Jun 4, 2019Updated 6 years ago
- Data mining algorithm PrefixSpan based on Python/数据挖掘算法PrefixSpan的简单Python实现☆22Jan 19, 2022Updated 4 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- ☆14Oct 28, 2020Updated 5 years ago
- A rotating socks proxy using Tor, Delegate and Haproxy☆14Apr 8, 2026Updated last week
- Android 恶意软件检测系统 使用 java 语言在 windows 环境下执行 apktool 工具的反编译命令,反编译 apk 文件,提取特征集,与恶意样本集比较计算出相似度,根据相似度判断是否为恶意软件。☆34Apr 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Human name parser based on JavaScrip-Name-Parser by Josh Fraser.☆12May 4, 2015Updated 10 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- Facet Search interface for MEMEX.☆13Feb 26, 2015Updated 11 years ago
- 地图选点一键导出公交到达圈的小工具☆11Apr 4, 2022Updated 4 years ago
- It is deep recommendation model with attribute-level co-attention, which has been accepted as a short paper in SIGIR2020.☆10Aug 13, 2020Updated 5 years ago
- ☆11Oct 15, 2020Updated 5 years ago
- An implementation of the prediction strength algorithm from Tibshirani, Walther, Botstein, and Brown's "Cluster validation by prediction …☆18Feb 17, 2011Updated 15 years ago
- Applying text model to Detection Task☆74May 9, 2017Updated 8 years ago
- ☆14Oct 19, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- eXpose deep neural network, detects malicious URLs, file paths and registry keys with proper training☆47Feb 13, 2018Updated 8 years ago
- SBHacks III (1/20/17-1/22/17): Won 2nd Place and MLH #HackHarassment Challenge, featured on DevPost's Staff Picks, Chrome extension meant…☆12Sep 5, 2017Updated 8 years ago
- A spring boot validation library from laravel.☆12Sep 6, 2023Updated 2 years ago
- A rotating socks proxy using Tor, Delegate and Haproxy☆27Nov 6, 2014Updated 11 years ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- A simple (and rather ad-hoc) port scanner for Tor hidden services.☆28Mar 5, 2015Updated 11 years ago