andrewaeva / DGALinks
The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research the possibility of applying machine learning and neural networks to detect and classify malicious domains.
☆219Updated 8 years ago
Alternatives and similar repositories for DGA
Users that are interested in DGA are comparing it to the libraries listed below
Sorting:
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- ☆269Updated 7 years ago
- Suspicious DGA from PDNS and Sandbox.☆186Updated 3 years ago
- DGA Domains detection☆67Updated 7 years ago
- Some results of my DGA reversing efforts☆678Updated 5 months ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 8 years ago
- Sweet, sweet, secrepo.com html.☆132Updated 3 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 10 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated 2 months ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆445Updated last year
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆107Updated 4 years ago
- Extract files from network traffic with Zeek.☆102Updated 5 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- Automatic Yara Rule Generation☆335Updated 9 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆438Updated 2 years ago
- ☆306Updated 8 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 3 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆197Updated 8 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆494Updated last month
- Cuckoo Sandbox Dockerfile☆329Updated 5 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368Updated last year
- A Tool for Automatic Analysis of Malware Behavior☆373Updated 6 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Rule sets for Sagan☆105Updated 4 years ago
- Cyber Threat Intelligence Feeds☆96Updated 8 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- VirusTotal Full api☆302Updated 2 years ago