The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research the possibility of applying machine learning and neural networks to detect and classify malicious domains.
☆223Jul 31, 2017Updated 8 years ago
Alternatives and similar repositories for DGA
Users that are interested in DGA are comparing it to the libraries listed below
Sorting:
- Some results of my DGA reversing efforts☆687Sep 28, 2025Updated 5 months ago
- A collection of known Domain Generation Algorithms☆67Apr 4, 2016Updated 9 years ago
- ☆11Jan 3, 2018Updated 8 years ago
- ☆270Aug 25, 2018Updated 7 years ago
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- Suspicious DGA from PDNS and Sandbox.☆186Jul 12, 2022Updated 3 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Sep 28, 2016Updated 9 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆55Sep 9, 2017Updated 8 years ago
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆26Jul 9, 2019Updated 6 years ago
- Sample DGA classifier☆128Jul 16, 2015Updated 10 years ago
- DGA-generated domain detection using deep learning models☆24Nov 21, 2022Updated 3 years ago
- Collected dataset of DGA domains and Alexa domains. Used for experiments in automatic DGA domains classification.☆20Apr 16, 2022Updated 3 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- A LSTM based framework for handling multiclass imbalance in DGA botnet detection☆22Sep 10, 2020Updated 5 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- dga classification with fasttext☆13Oct 29, 2018Updated 7 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Data Hacking Project☆783Mar 5, 2019Updated 6 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆30Aug 23, 2018Updated 7 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆12Jul 22, 2023Updated 2 years ago
- ☆14Oct 28, 2020Updated 5 years ago
- 基于深度学习对dga恶意域名检测研究☆58Dec 8, 2022Updated 3 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆177Oct 19, 2015Updated 10 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 7 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Oct 28, 2015Updated 10 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- c2 traffic☆194Feb 6, 2023Updated 3 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Jun 18, 2019Updated 6 years ago
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago