Sample DGA classifier
☆128Jul 16, 2015Updated 10 years ago
Alternatives and similar repositories for dga_classifier
Users that are interested in dga_classifier are comparing it to the libraries listed below
Sorting:
- ☆270Aug 25, 2018Updated 7 years ago
- ☆16Feb 25, 2022Updated 4 years ago
- A small program to detect gibberish using a Markov Chain☆607Feb 21, 2024Updated 2 years ago
- 使用LSTM模型检测DGA域名☆42Dec 30, 2019Updated 6 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- Suspicious DGA from PDNS and Sandbox.☆186Jul 12, 2022Updated 3 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆223Jul 31, 2017Updated 8 years ago
- ☆106Feb 2, 2018Updated 8 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Sep 28, 2016Updated 9 years ago
- Distinguish the site is used CDN☆18Nov 8, 2018Updated 7 years ago
- yarning about data science for white hat security researchers☆118Oct 16, 2019Updated 6 years ago
- Some results of my DGA reversing efforts☆687Sep 28, 2025Updated 5 months ago
- dns tunnel dectect with CNN☆63Jan 2, 2020Updated 6 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- security machine learning☆72May 15, 2017Updated 8 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago
- The python client of passivedns.cn☆97Dec 5, 2018Updated 7 years ago
- datacon比赛方向三-攻击源与攻击者分析writeup☆93May 26, 2019Updated 6 years ago
- ml webshellgg project☆38Nov 29, 2018Updated 7 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- 使用机器学习识别WebShell☆128Oct 26, 2017Updated 8 years ago
- ☆14May 13, 2018Updated 7 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- ☆153Jun 19, 2017Updated 8 years ago
- Will to be a niubility scan-framework☆519Jul 1, 2025Updated 8 months ago
- port knocking by otp auth☆24Jan 28, 2026Updated last month
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 5 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- Wooyun查询系统☆108Sep 26, 2015Updated 10 years ago
- a plenty of poc based on python☆290Jun 10, 2017Updated 8 years ago
- Script to run wvs in queue, and send mails to you on ending.☆82Oct 8, 2015Updated 10 years ago