A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
-
Updated
Jun 11, 2018 - JavaScript
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Information gathering & website reconnaissance | https://phishstats.info/
Detection of malicious domain names using machine learning and deep learning models
Anti Phishing Browser Extension by Segasec
hosts file to protect against malicious domains
A collection of scripts that use /etc/hosts to block advertising-related, tracking, and malicious domains.
All of IP's comes from my public honeypot.
Crowd-sourced domain blocklists that are free and open for use by everyone.
A Machine Learning Model to detect malicious urls which include Deep File Analysis on attributes as well dropped files.
Really simple tools to automate the generation of black hole Bind zones for known malicious hosts
Protect your computer/rooted-android-phone
Machine Learning Based Ransomware generated Command and Control Domain Detector.
A simple bash script to Obfuscate | De-Obfuscate bulk malicious domain list
CollectMalData is a set of small python scripts that I use to quickly collect information of interest that can be useful during a simple research process.
A static and dynamic features based URL Classifier.
A repository with source code for the detection of malicious domain.
Script to keep lists of external hosts sources up to date in a raw `domain.tld` format for easier manipulating date from external sources
Add a description, image, and links to the malicious-domains topic page so that developers can more easily learn about it.
To associate your repository with the malicious-domains topic, visit your repo's landing page and select "manage topics."