The report of a supervised classifier to detect malware in TLS traffic
☆20Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for tls-malware-detection
Users that are interested in tls-malware-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17May 5, 2021Updated 4 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 10 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- 2018年国际AIOps挑战赛KPI时序异常检测比赛基于OpenMLDB部署的工程化部署实践方案☆12Aug 30, 2022Updated 3 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Nov 8, 2020Updated 5 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.☆27Nov 23, 2022Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Canbus library for Golang☆10Apr 11, 2018Updated 7 years ago
- 如何做技术演讲(how to give a talk)的slide☆22Feb 8, 2021Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- ☆11Jun 11, 2025Updated 9 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- Python搭建代理IP池☆18Oct 16, 2019Updated 6 years ago
- ☆15Nov 29, 2020Updated 5 years ago
- Sublime Text 2 plugin for Simplenote☆11Oct 14, 2018Updated 7 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Dec 18, 2020Updated 5 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Mar 4, 2023Updated 3 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- ☆102Nov 26, 2020Updated 5 years ago
- PCAP files and data sets to Digital Investigation article☆28Nov 2, 2019Updated 6 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- ☆18Feb 17, 2025Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- ☆29Nov 15, 2022Updated 3 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Dec 4, 2025Updated 3 months ago