andrewaeva / DGA
The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research the possibility of applying machine learning and neural networks to detect and classify malicious domains.
☆219Updated 7 years ago
Alternatives and similar repositories for DGA
Users that are interested in DGA are comparing it to the libraries listed below
Sorting:
- Suspicious DGA from PDNS and Sandbox.☆184Updated 2 years ago
- ☆269Updated 6 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- DGA Domains detection☆66Updated 7 years ago
- Some results of my DGA reversing efforts☆667Updated last month
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆434Updated 2 years ago
- Sample DGA classifier☆124Updated 9 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆103Updated 3 years ago
- DGA Detection with ML and DL☆48Updated 5 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 10 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆76Updated 7 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆435Updated last year
- Passive Real-time Asset Detection System☆237Updated 11 months ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆477Updated 4 months ago
- Cyber Threat Intelligence Feeds☆95Updated 8 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 9 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆145Updated 2 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆174Updated 9 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆197Updated 8 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Threat Intelligence APIs☆279Updated last year
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Automatic Yara Rule Generation☆332Updated 9 years ago