baderj / domain_generation_algorithms
Some results of my DGA reversing efforts
☆638Updated 2 weeks ago
Related projects: ⓘ
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆217Updated 7 years ago
- ☆269Updated 6 years ago
- Suspicious DGA from PDNS and Sandbox.☆181Updated 2 years ago
- Indicators from Unit 42 Public Reports☆696Updated last week
- Suricata and Snort IDS rule and pcap testing system☆435Updated last week
- Tool to extract indicators of compromise from security reports in PDF format☆428Updated last year
- Malware Configuration And Payload Extraction☆743Updated last year
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆423Updated 8 months ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆513Updated 2 weeks ago
- Defanged Indicator of Compromise (IOC) Extractor.☆497Updated 3 weeks ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆462Updated 5 years ago
- yarGen is a generator for YARA rules☆1,533Updated 3 months ago
- ☆1,048Updated 5 years ago
- The Python SDK for AlienVault OTX☆354Updated 4 months ago
- PCAP Samples for Different Post Exploitation Techniques☆339Updated 3 years ago
- Automatic Yara Rule Generation☆328Updated 8 years ago
- A set of Zeek scripts to detect ATT&CK techniques.☆550Updated 2 months ago
- A collection of known Domain Generation Algorithms☆67Updated 8 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,602Updated last week
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆881Updated 3 weeks ago
- Utilities for MITRE™ ATT&CK☆1,008Updated 3 months ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,715Updated 4 months ago
- YARA Rules I come across on the internet☆327Updated 5 months ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆295Updated last year
- Cuckoo Sandbox Dockerfile☆321Updated 4 years ago
- ReversingLabs YARA Rules☆744Updated last week
- Extract and aggregate threat intelligence.☆820Updated 7 months ago
- AVClass malware labeling tool☆458Updated 2 weeks ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,243Updated 5 months ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆554Updated 3 months ago