chhayac / awesome-DGA
Domain Generation Algorithms research papers, datasets and code
☆15Updated 4 years ago
Alternatives and similar repositories for awesome-DGA:
Users that are interested in awesome-DGA are comparing it to the libraries listed below
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆25Updated 5 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- Anomaly detection based on DNS traffic analysis☆52Updated 4 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Updated 6 years ago
- ☆20Updated last year
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- A dataset of phishing kits in the wild☆15Updated 10 months ago
- A malware dataset curation tool which helps identify packed samples.☆32Updated 6 years ago
- ☆16Updated 6 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆65Updated 5 years ago
- Some of the presentations given by me☆18Updated 5 months ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Ender of Fast-Flux malicious domains.☆26Updated 10 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆21Updated 3 years ago
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 3 years ago
- Malware Machine Learning☆27Updated 7 years ago
- A Python based Intrusion Detection and Prevention System. Uses Scapy to sniff packets at a specific interface, extract the remote IPs, sc…☆9Updated 7 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Hosted analyzers built for Grapl☆13Updated 2 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- ☆13Updated 2 years ago
- ☆11Updated 7 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆12Updated 4 years ago
- Run-time trojan attack on neural networks☆26Updated 6 years ago