Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection
☆30Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for learn
Users that are interested in learn are comparing it to the libraries listed below
Sorting:
- Outlier Detection to detect DNS Tunnelling☆11Oct 8, 2018Updated 7 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Deep Learning for Domain Name System☆19Jan 14, 2022Updated 4 years ago
- 当崩坏3角色拥有朋友圈,会怎样呢?创意来自:https://www.bilibili.com/video/av27976619☆11Dec 26, 2018Updated 7 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆223Jul 31, 2017Updated 8 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- ☆18Mar 27, 2025Updated 11 months ago
- It exploits the chrome vulnerability and gets the all saved credentials in chrome☆10Jun 22, 2020Updated 5 years ago
- ☆12Sep 25, 2025Updated 5 months ago
- ☆11Updated this week
- Package hdiutil implements a macOS hdiutil command wrapper.☆13May 22, 2019Updated 6 years ago
- using iodine to tunnel IP via DNS☆14Feb 4, 2020Updated 6 years ago
- A python script to download APK files from apkpure.com☆13Apr 25, 2020Updated 5 years ago
- Decrypt php_screw using python☆12May 25, 2019Updated 6 years ago
- Applied unsupervised machine learning algorithms (K-Means Clustering and Isolation Forest) on time series data collected from an Air Hand…☆14May 6, 2019Updated 6 years ago
- My We Chall solution at http://www.wechall.net/☆12Mar 1, 2024Updated 2 years ago
- 使用Flink实现用户行为分析☆11Jun 29, 2020Updated 5 years ago
- Inject libraries into 32 processes on macOS Mojave☆16Mar 2, 2020Updated 6 years ago
- 链接跳转到JB IDE且自动执行某个动作☆15Dec 25, 2024Updated last year
- ☆10Mar 14, 2022Updated 3 years ago
- ☆55Jan 7, 2024Updated 2 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Identify synthetic domain names using Random Forrest Classifier☆13Jun 4, 2024Updated last year
- ☆12Oct 3, 2020Updated 5 years ago
- ☆15May 19, 2020Updated 5 years ago
- Minimal working template with auth for FastAPI, Supabase, SQLModel and more.☆26Feb 8, 2025Updated last year
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Apr 21, 2025Updated 10 months ago
- This script will not work with the latest version of chrome☆13May 11, 2025Updated 9 months ago
- 读取微信联系人列表,版本(3.9.12.51)☆13Mar 22, 2025Updated 11 months ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- ☆17Oct 15, 2024Updated last year
- Vulnerable application for security issues demo☆17Jan 18, 2019Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Kaggle Titanic Top 3% Solution (301/11487)☆15Aug 10, 2019Updated 6 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 3 years ago
- •.NET Clipboard for Nim•☆15May 16, 2019Updated 6 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago