Detection of malicious domains via character co-occurrence analysis in URL's.
☆11Mar 22, 2016Updated 10 years ago
Alternatives and similar repositories for malware-domain-detection
Users that are interested in malware-domain-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Domain name classifier looking for good vs. possibly malicious providers☆34May 4, 2018Updated 8 years ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Ender of Fast-Flux malicious domains.☆26Nov 2, 2014Updated 11 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆37Jan 14, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Tools☆13Apr 20, 2023Updated 3 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Demo Spree+Ionic Android/iOS App☆12Jun 4, 2015Updated 10 years ago
- IntelliJ IDEA Settings☆12Oct 10, 2017Updated 8 years ago
- Public GPLv2 release of 2nd generation Starlink Wifi Router Code☆13Apr 3, 2022Updated 4 years ago
- Example application to show how to do file upload in vanilla Rails 4.☆11Nov 12, 2016Updated 9 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- A rotating socks proxy using Tor, Delegate and Haproxy☆14Apr 8, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- Human name parser based on JavaScrip-Name-Parser by Josh Fraser.☆12May 4, 2015Updated 11 years ago
- ☆29May 4, 2016Updated 10 years ago
- The homework of Web Security☆21Nov 14, 2018Updated 7 years ago
- A tool for building lambda function images or zips via Docker☆19Apr 27, 2026Updated last week
- Facet Search interface for MEMEX.☆13Feb 26, 2015Updated 11 years ago
- 8x8x8 LED Cube, AtMega32☆27Apr 3, 2016Updated 10 years ago
- python DUML library for DJI drones☆12May 11, 2020Updated 5 years ago
- An implementation of the prediction strength algorithm from Tibshirani, Walther, Botstein, and Brown's "Cluster validation by prediction …☆18Feb 17, 2011Updated 15 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- ☆14Oct 19, 2018Updated 7 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- a graph-based knowledge search engine powered by Wikipedia☆15May 1, 2023Updated 3 years ago
- Munin plugin for Tor, moved to https://github.com/munin-monitoring/contrib/blob/master/plugins/tor/tor_☆14May 1, 2020Updated 6 years ago
- A rotating socks proxy using Tor, Delegate and Haproxy☆27Nov 6, 2014Updated 11 years ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- A simple (and rather ad-hoc) port scanner for Tor hidden services.☆28Mar 5, 2015Updated 11 years ago
- Information Propagation in a Social Network☆28Sep 10, 2011Updated 14 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is a python simple tool for generating charts for ROC curve☆25Sep 22, 2010Updated 15 years ago
- $5 Cyber Weapons & How to Use Them☆11Jul 25, 2022Updated 3 years ago
- Compilation of peHash implementations.☆15May 2, 2019Updated 7 years ago
- A chat application that can ecnrypt messages with remote user's public Key and decrypt messages with local user's private Key☆11Jan 14, 2020Updated 6 years ago
- PoC for a kernel rootkit☆10Feb 20, 2020Updated 6 years ago
- A warehouse for your malware☆20Feb 25, 2013Updated 13 years ago
- US sales tax extension for Spree using the Tax Cloud service.☆15Apr 29, 2021Updated 5 years ago