DGA Domains detection
☆70Apr 10, 2018Updated 8 years ago
Alternatives and similar repositories for dga_detector
Users that are interested in dga_detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DGA Domain Detection using Bigram Frequency Analysis☆55Sep 9, 2017Updated 8 years ago
- ☆269Aug 25, 2018Updated 7 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆223Jul 31, 2017Updated 8 years ago
- DGA Detection with ML and DL☆53Sep 9, 2019Updated 6 years ago
- dga classification with fasttext☆12Oct 29, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DGA-generated domain detection using deep learning models☆23Nov 21, 2022Updated 3 years ago
- 基于深度学习对dga恶意域名检测研究☆58Dec 8, 2022Updated 3 years ago
- Some results of my DGA reversing efforts☆688Sep 28, 2025Updated 6 months ago
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆25Jul 9, 2019Updated 6 years ago
- Sample DGA classifier☆127Jul 16, 2015Updated 10 years ago
- ☆14Oct 28, 2020Updated 5 years ago
- ☆25Aug 25, 2015Updated 10 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 9 years ago
- Detecting DGA bots in a single network using DNS traffic☆26Feb 7, 2018Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Asynchronous DNS query pipeline for Python☆10May 4, 2015Updated 10 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- A LSTM based framework for handling multiclass imbalance in DGA botnet detection☆22Sep 10, 2020Updated 5 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- ☆305May 28, 2017Updated 8 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Jun 7, 2017Updated 8 years ago
- A Python library and command line tools to provide interactive log visualization.☆144Dec 27, 2022Updated 3 years ago
- ☆12Jun 7, 2018Updated 7 years ago
- Fork of http://godoc.org/code.google.com/p/gopacket☆21Jul 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆16Jan 31, 2015Updated 11 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- A flow-based network monitor with Deep Packet Inspection☆29Oct 27, 2016Updated 9 years ago
- Anomaly Detection using SH-ESD☆10Feb 6, 2019Updated 7 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 10 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 5 months ago
- Show summary of a large number of URLs in a Jupyter Notebook☆19Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python library for Cymon.io APIs☆32Jan 3, 2017Updated 9 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- A tools to work on suricata stats.log file.☆30Oct 14, 2015Updated 10 years ago
- 无线局域网入侵检测系统☆12Oct 25, 2018Updated 7 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆171Feb 19, 2025Updated last year
- Domain Generation Algorithms research papers, datasets and code☆15May 17, 2020Updated 5 years ago