endgameinc / dga_predictLinks
☆269Updated 7 years ago
Alternatives and similar repositories for dga_predict
Users that are interested in dga_predict are comparing it to the libraries listed below
Sorting:
- Suspicious DGA from PDNS and Sandbox.☆186Updated 3 years ago
- Sample DGA classifier☆127Updated 10 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 8 years ago
- DGA Domains detection☆68Updated 7 years ago
- Some results of my DGA reversing efforts☆676Updated last week
- dns tunnel dectect with CNN☆63Updated 5 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated 2 months ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 10 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆272Updated 3 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆133Updated 4 years ago
- Sweet, sweet, secrepo.com html.☆132Updated 4 years ago
- DGA Detection with ML and DL☆51Updated 6 years ago
- ☆306Updated 8 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 7 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆498Updated 2 weeks ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆29Updated 3 years ago
- 使用LSTM模型检测DGA域名☆42Updated 5 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆446Updated last year
- ☆172Updated 7 years ago
- security machine learning☆72Updated 8 years ago
- Applying text model to Detection Task☆73Updated 8 years ago
- Cuckoo Sandbox Dockerfile☆329Updated 5 years ago
- ☆11Updated 7 years ago
- Extract files from network traffic with Zeek.☆102Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆107Updated 4 years ago
- Machine learning driven web application firewall to detect malicious queries with high accuracy.☆429Updated 8 years ago
- The pattern matching swiss knife☆141Updated 5 years ago