Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning
☆14Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for IoT-Botnet-Attack-Detection-Module
Users that are interested in IoT-Botnet-Attack-Detection-Module are comparing it to the libraries listed below
Sorting:
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Mar 13, 2026Updated last week
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 3 years ago
- ☆11Mar 21, 2024Updated 2 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- HTML5 mini-MMORPG with Nano payouts☆11Sep 25, 2021Updated 4 years ago
- docker image for web mining bananos☆10Mar 13, 2020Updated 6 years ago
- Transform a simple plain-text database to JSON☆15Nov 14, 2022Updated 3 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- ☆12Feb 18, 2020Updated 6 years ago
- A Completely Distributed Botnet written in Go - DEPRECATED☆12Jul 1, 2016Updated 9 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- ☆16Dec 29, 2022Updated 3 years ago
- Pentesting post exploitation tool for slack☆33Nov 15, 2025Updated 4 months ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆13Jul 10, 2024Updated last year
- Thanatos.☆16Apr 29, 2021Updated 4 years ago
- The source code of algorithms in paper "Incentive-Driven Task Offloading and Collaborative Computing in Device-Assisted MEC Networks".☆15Dec 22, 2024Updated last year
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- The detection of Botnet attacks on various IOT Devices using various Machine Learning Models☆15Dec 31, 2019Updated 6 years ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- ☆20Jul 21, 2024Updated last year
- Hybrid Blockchain POW/POS Cryptocurrency. Pure-(PoS) protocols with IVIE☆12Sep 18, 2023Updated 2 years ago
- Simulation of the process of quantum Teleportation of a single quantum bit over a full-entangled channel.☆16Apr 8, 2020Updated 5 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- Smart Contracts for Schneider Electric (using OraclizeAPI)☆10Nov 11, 2018Updated 7 years ago
- Code for the NeurIPS 2023 Paper: Robust Multi-Agent Reinforcement Learning via Adversarial Regularization: Theoretical Foundation and Sta…☆30Oct 29, 2023Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- BANANO Quest☆19Dec 13, 2018Updated 7 years ago
- Implementation of Adversarial Multi-Distillation for Automatic Modulation Recognition Models.☆27Nov 2, 2023Updated 2 years ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- A collection of Jupyter Notebooks with explanations, insights, tutorials, exercises and showing how to use the Qiskrypt software suite, b…☆12Jun 28, 2021Updated 4 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- Easy Trend Visualizer indicator helps detect and mark trends, which can help you to avoid sideways markets.☆13Jun 4, 2025Updated 9 months ago