Generate network packets using generative modeling
☆15May 17, 2023Updated 2 years ago
Alternatives and similar repositories for NetworkPacketGenerator
Users that are interested in NetworkPacketGenerator are comparing it to the libraries listed below
Sorting:
- ☆19Mar 29, 2022Updated 3 years ago
- ☆31Oct 14, 2023Updated 2 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Argus is a system and network monitoring application☆14Jan 16, 2020Updated 6 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆17Nov 24, 2022Updated 3 years ago
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 11 months ago
- 在cifar10数据集下对resnet-18加入se-net的效果测试☆10May 9, 2019Updated 6 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆43Aug 10, 2021Updated 4 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 6 months ago
- ☆12Jul 8, 2022Updated 3 years ago
- ☆21Feb 5, 2026Updated last month
- Free and open implementation of the IEC 60870-6 TASE.2 protocol☆20Apr 29, 2020Updated 5 years ago
- MSIEVE: A Library for Factoring Large Integers☆15Apr 7, 2023Updated 2 years ago
- CTF MISC 方向从入门到精通指南,个人 MISC 知识点总结☆20Sep 15, 2025Updated 6 months ago
- ☆20Jan 20, 2021Updated 5 years ago
- 该资源是作者收集各种类型CTF比赛的常用工具,包括Web、RE、Misc、Crypto、PWN、IOT等方向,非常适合安全初学者。希望对您有所帮助,也欢迎大家补充~☆13Aug 25, 2024Updated last year
- Webhawk/Catch helps automatically finding web attack traces in logs☆16Aug 12, 2025Updated 7 months ago
- 训练的模板☆10Oct 10, 2023Updated 2 years ago
- Laplacian Change Point Detection for Dynamic Graphs (KDD 2020)☆29Jul 13, 2023Updated 2 years ago
- LilCTF 2025 challenges, source code, official writeups, and players' writeups.☆29Oct 10, 2025Updated 5 months ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- To generate decoy traffic against WF attack using GAN☆12Jul 17, 2025Updated 8 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- High-Fidelity Synthetic Network Traffic Generation☆77Sep 20, 2025Updated 6 months ago
- 哈工大毕业设计:面向网络靶场的自适应仿真流量生成技术☆15Jun 9, 2022Updated 3 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆18Aug 3, 2023Updated 2 years ago
- GAN(生成对抗网络)图片生成☆14Dec 29, 2019Updated 6 years ago
- MCP Gateway for external Authentication and Authorization☆29Jan 27, 2026Updated last month
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆19Jan 7, 2026Updated 2 months ago
- ☆20Mar 25, 2024Updated last year
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- ☆19Jan 2, 2025Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- ☆16Mar 27, 2025Updated 11 months ago
- Word2Vec embeddings over packet capture data n-grams.☆20Mar 24, 2023Updated 2 years ago