DGA-generated domain detection using deep learning models
☆24Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for degas
Users that are interested in degas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- dga classification with fasttext☆12Oct 29, 2018Updated 7 years ago
- A collection of known Domain Generation Algorithms☆68Apr 4, 2016Updated 9 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Nov 6, 2018Updated 7 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- DGA Detection with ML and DL☆52Sep 9, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆224Jul 31, 2017Updated 8 years ago
- ☆11Jan 3, 2018Updated 8 years ago
- This notebook includes data scraping. For this beautifulsoup and selinium is used. It takes a website URL as an input and extracts the in…☆10Aug 4, 2021Updated 4 years ago
- Phishing attack identification tool - Performs email risk evaluations relying on different black lists, machine learning techniques, and …☆18Feb 27, 2023Updated 3 years ago
- this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for it…☆14Sep 5, 2016Updated 9 years ago
- Adversary Emulation Planner☆42Jan 9, 2026Updated 2 months ago
- ☆269Aug 25, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Aug 3, 2024Updated last year
- 新闻聚合+新闻推荐网站☆10Jun 21, 2017Updated 8 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- ☆12Sep 12, 2020Updated 5 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- A collection of utilities to gain user path insights from exported FullStory data.☆12Sep 13, 2023Updated 2 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Block process execute kernel driver for Windows x64☆19Apr 7, 2016Updated 9 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Measurement system I built during my PhD to collect and analyse large-scale datasets; including phishing and malware attacks on Twitter, …☆16Jun 25, 2021Updated 4 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Hogzilla is an Intrusion Detection System (IDS) supported by Snort, Apache Spark, HBase and libnDPI, which provides Network Anomaly Detec…☆28Apr 18, 2018Updated 7 years ago
- Builder for Module Store v2.☆10Aug 28, 2022Updated 3 years ago
- ⚡Web component for trigger payment request through WebLN protocol☆11Jun 3, 2021Updated 4 years ago
- Did someone say types?☆13Sep 5, 2016Updated 9 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Oct 18, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A fast implementation of Leiserchess AI for MIT 6.172`16 http://scrimmage.csail.mit.edu/☆12Dec 22, 2016Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Apr 10, 2017Updated 8 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- create multiple stream servers easily☆19Oct 29, 2019Updated 6 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 6 months ago
- ☆20Mar 8, 2026Updated 2 weeks ago