Malicious domain name detection based on tensorflow
☆36Jan 6, 2018Updated 8 years ago
Alternatives and similar repositories for domain_malicious_detection
Users that are interested in domain_malicious_detection are comparing it to the libraries listed below
Sorting:
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆17Apr 26, 2021Updated 4 years ago
- 对一些开源cms官网的更新,github commit进行监控的工具☆11Dec 27, 2018Updated 7 years ago
- GUI Password Manager by PyQt5☆20Aug 2, 2019Updated 6 years ago
- ☆10Sep 25, 2024Updated last year
- ☆14Oct 28, 2020Updated 5 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- A rust-version of NVIDIA BlueField DOCA kit.☆14Jun 11, 2023Updated 2 years ago
- taobao ip location data offline version☆58May 8, 2013Updated 12 years ago
- BiLSTM+CNN+CRF NER, using pytorch☆16May 26, 2019Updated 6 years ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data☆14Mar 26, 2014Updated 11 years ago
- ☆17Jul 25, 2024Updated last year
- eAudit suite for recording provenance-related system calls on Linux☆20Jan 16, 2026Updated 2 months ago
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆19May 6, 2024Updated last year
- 这是一款适用于Ubuntu(基于12.04)系统的操作系统测评软件,名为乐测评, 主要对系统进行如下六个方面的性能检测:CPU、内存、磁盘&IO、网络、开机速度、系统安全,软硬件方面都会进行较全面的检测。每个方面先检测操作系统基本信息,让用户对自己的系统 有个基本了解。然后…☆17Mar 25, 2017Updated 8 years ago
- A Docker based Honey Pot☆17Oct 3, 2018Updated 7 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- 使用spark + kudu的案例☆15Sep 13, 2017Updated 8 years ago
- LSTM,TextCNN,fastText情感分析,模型用 tf_serving 和 flask 部署成web应用☆43Sep 15, 2019Updated 6 years ago
- 基于互联网金融平台2015年度贷款数据完成信贷违约预测模型,该模型可以作为信贷平台预测违约借款人的参考☆71Jul 25, 2018Updated 7 years ago
- Domains used for university-issued email addresses☆17Apr 29, 2016Updated 9 years ago
- Research on cybersecurity data usage in research papers☆15Dec 15, 2017Updated 8 years ago
- 毕业生离校管理系统☆10Feb 22, 2023Updated 3 years ago
- OpenStack Swift protocol implementation used in Cyberduck☆24Mar 9, 2026Updated last week
- Unofficial P4_16 implementation of the HashPipe heavy hitter detection algorithm proposed in the paper, "Heavy-Hitter Detection Entirely …☆19Jun 5, 2020Updated 5 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Focus on ICS, providing the latest ICS consulting, research, services(专注工控网络安全,提供最新的工控网络安全咨询、研究、服务)☆19Mar 17, 2018Updated 8 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- Host log detection based on deep learning 基于LSTM神经网络模型的日志异常检测☆92Dec 8, 2022Updated 3 years ago
- ☆11May 2, 2023Updated 2 years ago
- dataSet for kubAnomaly model☆19Mar 24, 2023Updated 2 years ago
- ICSE 2020 Artifact for: Learning from, Understanding, and Supporting DevOps Artifacts for Docker☆24Dec 8, 2022Updated 3 years ago
- 武汉新型冠状病毒防疫物资信息捐赠通道 -> 采用更便捷的方案展示☆18Jan 5, 2023Updated 3 years ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- tooling for collecting masscan data☆12Apr 5, 2023Updated 2 years ago
- running real time style net and CycleGAN in pyqt!☆13Feb 7, 2020Updated 6 years ago