Generate network packets using generative modeling
☆15May 17, 2023Updated 2 years ago
Alternatives and similar repositories for NetworkPacketGenerator
Users that are interested in NetworkPacketGenerator are comparing it to the libraries listed below
Sorting:
- ☆19Mar 29, 2022Updated 3 years ago
- ☆31Oct 14, 2023Updated 2 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- ☆20Feb 5, 2026Updated 3 weeks ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆43Aug 10, 2021Updated 4 years ago
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 10 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- LilCTF 2025 challenges, source code, official writeups, and players' writeups.☆27Oct 10, 2025Updated 4 months ago
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- ☆16Mar 27, 2025Updated 11 months ago
- ☆11Oct 28, 2023Updated 2 years ago
- CTF MISC 方向从入门到精通指南,个人 MISC 知识点总结☆20Sep 15, 2025Updated 5 months ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- Dynamic Modification Neural Network Model for Short-term Traffic Prediction☆11Sep 1, 2020Updated 5 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- ☆18Jan 2, 2025Updated last year
- 基于netty实现的一个数据库代理服务,可用作动态脱敏系统☆12Feb 16, 2022Updated 4 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- GAN(生成对抗网络)图片生成☆14Dec 29, 2019Updated 6 years ago
- ☆12Jul 8, 2022Updated 3 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- 一个流量分类的封装框架☆62Aug 25, 2024Updated last year
- ☆58Dec 8, 2022Updated 3 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- To generate decoy traffic against WF attack using GAN☆13Jul 17, 2025Updated 7 months ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- 哈工大毕业设计:面向网络靶场的自适应仿真流量生成技术☆15Jun 9, 2022Updated 3 years ago
- 该资源是作者收集各种类型CTF比赛的常用工具,包括Web、RE、Misc、Crypto、PWN、IOT等方向,非常适合安全初学者。希望对您有所帮助,也欢迎大家补充~☆13Aug 25, 2024Updated last year
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆19Jan 7, 2026Updated last month
- Geographical Information Science Tutorial and Practice course in UCAS☆13Dec 12, 2021Updated 4 years ago
- ☆18Feb 22, 2022Updated 4 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- ☆17Dec 25, 2023Updated 2 years ago
- Automated Safety Testing of Large Language Models☆18Jan 31, 2025Updated last year