matthoffman / degas
DGA-generated domain detection using deep learning models
☆23Updated 2 years ago
Alternatives and similar repositories for degas:
Users that are interested in degas are comparing it to the libraries listed below
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- A collection of known Domain Generation Algorithms☆66Updated 8 years ago
- DGA Domains detection☆65Updated 6 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 7 years ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Cyber Threat Intelligence Feeds☆95Updated 8 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 4 years ago
- A Python library for parsing, manipulating, and generating MAEC content.☆41Updated 4 years ago
- Detect cryptocurrency mining traffic with Zeek.☆46Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 2 months ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆76Updated 7 months ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- Gather and compile open source threat intelligence feeds.☆39Updated 3 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Passive DNS V2☆61Updated 11 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆77Updated 2 weeks ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Hunting IOCs all day every day...☆86Updated last year
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 2 months ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Updated 9 years ago
- Definition, description and relationship types of MISP objects☆96Updated last week
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago