miaWallace0618 / DGA_Detection
DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.
☆15Updated 6 years ago
Alternatives and similar repositories for DGA_Detection:
Users that are interested in DGA_Detection are comparing it to the libraries listed below
- ☆16Updated 6 years ago
- My notes on various topics☆64Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- ☆14Updated 6 years ago
- ☆40Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆32Updated 7 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- A Pythonic interface and command line tool for interacting with the InQuest Labs API.☆35Updated last year
- Threat Mapping Catalogue☆17Updated 3 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Updated 13 years ago
- Security Weaknesses in Machine Learning☆15Updated last year
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated last year
- CTI database generator and public dataset☆21Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 4 months ago
- ☆25Updated last year
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆24Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 2 weeks ago
- ☆22Updated 3 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago