Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).
☆41Sep 28, 2016Updated 9 years ago
Alternatives and similar repositories for dga
Users that are interested in dga are comparing it to the libraries listed below
Sorting:
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆224Jul 31, 2017Updated 8 years ago
- Extract the top level domain and subdomain from a host name.☆17Jan 6, 2020Updated 6 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆177Oct 19, 2015Updated 10 years ago
- ☆15Feb 28, 2017Updated 9 years ago
- Data Hacking Project☆783Mar 5, 2019Updated 7 years ago
- ☆49Apr 22, 2013Updated 12 years ago
- A collection of known Domain Generation Algorithms☆67Apr 4, 2016Updated 9 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Topics in statistical computing @ ISU☆18Sep 4, 2015Updated 10 years ago
- ☆11Jan 3, 2018Updated 8 years ago
- Interface to the boilerpipe Java library by Christian Kohlschutter (http://code.google.com/p/boilerpipe/)☆21May 19, 2021Updated 4 years ago
- The Compressed Pcap Packet Indexing Program☆30Nov 10, 2015Updated 10 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Jun 7, 2017Updated 8 years ago
- Random fiddling stored in notebooks☆22Mar 11, 2017Updated 9 years ago
- ☆270Aug 25, 2018Updated 7 years ago
- R package to translate text using Yandex Translate API☆16Sep 25, 2019Updated 6 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Suspicious DGA from PDNS and Sandbox.☆186Jul 12, 2022Updated 3 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- an open source ransomware-like file crypter kit☆13Apr 4, 2016Updated 9 years ago
- Google's list of Certificate Transparency logs as a rust crate for use with sct.rs☆14Feb 17, 2023Updated 3 years ago
- the source code that powered gitlive.net☆11Feb 12, 2016Updated 10 years ago
- Passivedns monitor implementation in Rust.☆12Apr 21, 2016Updated 9 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- A curated blocklist of Autonomous System Numbers (ASNs) associated with VPN providers, datacenters, and hosting services commonly used fo…☆15Mar 11, 2026Updated last week
- Time-Machine Dynamic Bulk Packet Recorder☆36Apr 21, 2025Updated 11 months ago
- Analysis pipeline for quick ML analyses.☆11Oct 4, 2018Updated 7 years ago
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- s3 as a datastore: A way to use S3 as a key-value datastore instead of a real datastore. can be read as s3aadatastore☆14Mar 16, 2023Updated 3 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- PyData Boston 2013 talks: "Intro to scikit-learn" & "Realtime Predictive Analytics: Using scikit-learn and RabbitMQ"☆11Jan 5, 2014Updated 12 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 9 years ago
- ☆28Nov 20, 2025Updated 4 months ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- Passive DNS V2☆60Mar 27, 2014Updated 11 years ago