A Natural Language Processing based approach to detect malicious HTTP requests.
☆11Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for seq2seq-anomaly-detection
Users that are interested in seq2seq-anomaly-detection are comparing it to the libraries listed below
Sorting:
- This project has been conducted under the supervision of Dr. Jinoh Kim and Dr. Donghwoon Kwon at Texas A&M University-Commerce. The res…☆17Jan 30, 2019Updated 7 years ago
- 微信公众号毫秒级排版,让你的排版充满审美愉悦感。复制代码到“markdown here基本渲染css”即可。☆35Jan 10, 2024Updated 2 years ago
- A Tools For Spoon (https://spooncast.net), to Increase Tap Love, Fans, Viewers Of Fans, Report, and etc.☆10Nov 9, 2022Updated 3 years ago
- ☆23May 15, 2019Updated 6 years ago
- 该资源为作者AI安全相关论文的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆33Jan 9, 2025Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Google Safe Browsing API v4 Client Implementation in Java☆10Jul 7, 2022Updated 3 years ago
- ☆32Nov 17, 2017Updated 8 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- Logr - logging and metrics service☆14Jul 6, 2025Updated 7 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- This project requires to develop a customer segmentation to define marketing strategy. The sample dataset summarizes the usage behavior o…☆12Oct 14, 2019Updated 6 years ago
- Distributed Spatial Join Based on Spark☆10May 26, 2022Updated 3 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- ☆22Aug 29, 2025Updated 6 months ago
- Machine-learning-based intrusion detection☆38Jul 13, 2018Updated 7 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Mar 21, 2022Updated 3 years ago
- PHP 发送邮件,可以发送附件,下载可直接预览。☆10Jul 20, 2015Updated 10 years ago
- ☆10Mar 31, 2022Updated 3 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- Improved ganomaly2d and for foreign object detection☆12Sep 28, 2019Updated 6 years ago
- PathVis visualises traceroutes☆11Jan 25, 2024Updated 2 years ago
- Captain Crunch is a modern wordlist generator that lets you specify a collection of character sets and then generate all possible permuta…☆11Feb 2, 2021Updated 5 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- Subsampled Graph-Based DBSCAN☆11Oct 21, 2020Updated 5 years ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- A high-performance matcher designed to solve LOGICAL and TEXT VARIATIONS problems in word matching, implemented in Rust.☆17Feb 26, 2026Updated last week
- python模拟登陆csdn☆11Jun 23, 2017Updated 8 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- malicious PowerShell script detection model☆43Aug 30, 2021Updated 4 years ago
- A lightweight WAF (web app firewall) written in Golang☆13May 3, 2021Updated 4 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 11 months ago