andrewaeva / DGA
The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research the possibility of applying machine learning and neural networks to detect and classify malicious domains.
☆218Updated 7 years ago
Alternatives and similar repositories for DGA:
Users that are interested in DGA are comparing it to the libraries listed below
- Suspicious DGA from PDNS and Sandbox.☆183Updated 2 years ago
- ☆268Updated 6 years ago
- A collection of known Domain Generation Algorithms☆66Updated 8 years ago
- DGA Domains detection☆63Updated 6 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- Some results of my DGA reversing efforts☆656Updated 6 months ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆471Updated last month
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆433Updated 2 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆434Updated last year
- DGA Detection with ML and DL☆47Updated 5 years ago
- Sample DGA classifier☆124Updated 9 years ago
- Cyber Threat Intelligence Feeds☆94Updated 8 years ago
- Extract files from network traffic with Zeek.☆100Updated 4 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- Set of tools for interacting with Malshare☆152Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆121Updated 3 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆149Updated 9 months ago
- The Python SDK for AlienVault OTX☆368Updated 9 months ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 2 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆75Updated 7 years ago
- Automatic Yara Rule Generation☆332Updated 9 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- Threat Intelligence APIs☆276Updated last year
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago