miaWallace0618 / DGA_Detection
DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.
☆15Updated 6 years ago
Alternatives and similar repositories for DGA_Detection:
Users that are interested in DGA_Detection are comparing it to the libraries listed below
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- ☆16Updated 6 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 11 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 7 months ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- ☆25Updated last year
- ☆39Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- A dataset of phishing kits in the wild☆15Updated 9 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- A Pythonic interface and command line tool for interacting with the InQuest Labs API.☆35Updated last year
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- ☆21Updated 3 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- Security Weaknesses in Machine Learning☆15Updated last year
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 11 months ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 2 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆25Updated 5 years ago