The report of a supervised classifier to detect malware in TLS traffic
☆21Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for tls-malware-detection
Users that are interested in tls-malware-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SSH traffic analysis☆23Apr 16, 2019Updated 7 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Apr 5, 2022Updated 4 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 10 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆60Nov 8, 2020Updated 5 years ago
- 基于流量数据 的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.☆26Nov 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 11 months ago
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 5 years ago
- ghidra scripts☆15Feb 5, 2021Updated 5 years ago
- ☆11Jun 11, 2025Updated 10 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 9 months ago
- ☆15Nov 29, 2020Updated 5 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Dec 18, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆24Mar 4, 2023Updated 3 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- ☆101Nov 26, 2020Updated 5 years ago
- ☆17Nov 13, 2024Updated last year
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- ☆17Feb 17, 2025Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆74Dec 16, 2021Updated 4 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Dec 4, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Coburg Intrusion Detection Data Sets☆51Oct 25, 2017Updated 8 years ago
- 恶意流量分 析程序☆197Dec 11, 2017Updated 8 years ago
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- emotet configs pulled from https://cape.contextis.com/☆15Apr 27, 2022Updated 4 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆31Sep 23, 2025Updated 7 months ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- CVE Exploit PoC's☆34Sep 3, 2023Updated 2 years ago