matthoffman / degasLinks
DGA-generated domain detection using deep learning models
☆23Updated 2 years ago
Alternatives and similar repositories for degas
Users that are interested in degas are comparing it to the libraries listed below
Sorting:
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- DGA Domains detection☆66Updated 7 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 2 months ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Cyber Threat Intelligence Feeds☆96Updated 8 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆80Updated 10 months ago
- Documentation for Zeek☆50Updated this week
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 5 months ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆34Updated 4 years ago
- Zeek support for Community ID flow hashing.☆35Updated last year
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Updated 7 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆31Updated 11 months ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 4 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated 2 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- An example for implementation of ssdeep similarity search optimized with elasticsearch☆35Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 weeks ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago