Some results of my DGA reversing efforts
☆686Sep 28, 2025Updated 5 months ago
Alternatives and similar repositories for domain_generation_algorithms
Users that are interested in domain_generation_algorithms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆224Jul 31, 2017Updated 8 years ago
- ☆269Aug 25, 2018Updated 7 years ago
- Suspicious DGA from PDNS and Sandbox.☆186Jul 12, 2022Updated 3 years ago
- A collection of known Domain Generation Algorithms☆68Apr 4, 2016Updated 9 years ago
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Sample DGA classifier☆127Jul 16, 2015Updated 10 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆55Sep 9, 2017Updated 8 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆30Aug 23, 2018Updated 7 years ago
- 基于深度学习对dga恶意域名检测研究☆58Dec 8, 2022Updated 3 years ago
- DGA Detection with ML and DL☆52Sep 9, 2019Updated 6 years ago
- ☆11Jan 3, 2018Updated 8 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,934Updated this week
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated 2 weeks ago
- 使用LSTM模型检测DGA域名☆42Dec 30, 2019Updated 6 years ago
- Indicators from Unit 42 Public Reports☆726Aug 17, 2025Updated 7 months ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- ☆12Jun 24, 2017Updated 8 years ago
- ☆117Aug 9, 2016Updated 9 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,643Jan 1, 2024Updated 2 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Jun 23, 2017Updated 8 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆477Jun 16, 2023Updated 2 years ago
- Malware Sinkhole List in various formats☆104Jul 6, 2022Updated 3 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 7 months ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- Data Hacking Project☆783Mar 5, 2019Updated 7 years ago
- Repository of yara rules☆4,730Apr 17, 2024Updated last year
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Python Decoders for Common Remote Access Trojans☆1,117Jul 16, 2024Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆964Feb 28, 2026Updated 3 weeks ago
- The Multiplatform Linux Sandbox☆266Jan 3, 2022Updated 4 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- ☆16Updated this week
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- Malicious traffic detection system☆8,329Updated this week
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆26Jul 9, 2019Updated 6 years ago