Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection
☆30Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for learn
Users that are interested in learn are comparing it to the libraries listed below
Sorting:
- Exploring internet domain names with deep learning using vector embeddings☆20Dec 14, 2018Updated 7 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Anomaly detection based on DNS traffic analysis☆55Jul 30, 2020Updated 5 years ago
- dns tunnel dectect with CNN☆63Jan 2, 2020Updated 6 years ago
- Passive DNS Dataset of Domain Resolutions☆18Jun 14, 2022Updated 3 years ago
- 通过pcap文件生成描述网络传输报文的文本文件☆16Dec 22, 2017Updated 8 years ago
- a very simple rootkit for fun☆19Nov 6, 2018Updated 7 years ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- datacon比赛方向三-攻击源与攻击者分析writeup☆93May 26, 2019Updated 6 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- using iodine to tunnel IP via DNS☆14Feb 4, 2020Updated 6 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆224Jul 31, 2017Updated 8 years ago
- Andiodine is a dns-tunneling solutions that allows you tunnel IPv4 data through a DNS server. This is very usable in different situations…☆13Apr 16, 2024Updated last year
- ☆77Feb 26, 2018Updated 8 years ago
- 当崩坏3角色拥有朋友圈,会怎样呢?创意来自:https://www.bilibili.com/video/av27976619☆11Dec 26, 2018Updated 7 years ago
- Hands-On Android UI Development, published by Packt☆14Jan 30, 2023Updated 3 years ago
- In this repository, I have used ARIMA,SARIMA,AutoArima,ANN,CNN and LSTMs for time series modelling and Anomaly detection has been done us…☆12Feb 8, 2021Updated 5 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- ☆15May 23, 2022Updated 3 years ago
- Insurance claim fraud detection using machine learning algorithms.☆12May 6, 2020Updated 5 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- Botnet is a form of malware that attacks computers on the internet and controls them with command and control servers to perform a wide v…☆11May 12, 2020Updated 5 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Applied unsupervised machine learning algorithms (K-Means Clustering and Isolation Forest) on time series data collected from an Air Hand…☆14May 6, 2019Updated 6 years ago
- Repo for everyone who wants a machine learning basic☆10May 1, 2020Updated 5 years ago
- ☆19Jan 13, 2020Updated 6 years ago
- ☆10Mar 14, 2022Updated 4 years ago
- 利用查询啦接口,chinaz,ip138接口,百度云观测接口查询子域名☆10Apr 14, 2018Updated 7 years ago
- A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the…☆14Jan 3, 2020Updated 6 years ago
- 用于IP定位,包含了纯真IP库,和自己爬出来的本地文本库两种方法。☆13Jan 21, 2015Updated 11 years ago
- ☆20Dec 19, 2025Updated 3 months ago
- ☆16Jul 17, 2021Updated 4 years ago
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- ☆17Oct 15, 2024Updated last year
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- 江苏图采上传工具☆11May 13, 2023Updated 2 years ago
- Webzen Data Analysis Tool Library☆21Jul 9, 2018Updated 7 years ago