Fraud hosts with substantial amount of fraudulent traffic using the impression logs for selected IP addresses
-
Updated
Feb 17, 2018 - Jupyter Notebook
Fraud hosts with substantial amount of fraudulent traffic using the impression logs for selected IP addresses
2-10g OVH, 90-100G UDP Stable Power
GHOST RAT 2026 Analysis and SRC
Best DDoS attack simulation environment with comprehensive attack vectors, AI service targeting, and fully customizable botnet topologies. Research, test, and visualize modern DDoS attacks in a controlled environment.
Asynchronous IoT network scanner with service detection, brute-force, and automated payload deployment (miner/botnet). Supports IPv4/IPv6, SSH, FTP, HTTP, SNMP, mDNS, SSDP.
Tailsploit Framework - A powerful and educational tool designed for acquiring insights into botnet functionality. (Early Stage Development)
This Python script provides a sophisticated botnet detection system that leverages signature-based detection, machine learning algorithms, behavioral analysis, and traffic profiling to identify potential botnet activity in real-time. It also includes advanced alerting capabilities and integration with IP reputation services and SIEM for DETECTION!
This repository contains C++ implementations of algorithms and data structures designed for the analysis of server logs in order to identify and combat botnet attacks.
This project demonstrates how attackers can exploit Discord as a covert Command-and-Control (C2) channel to remotely control compromised Windows systems. It aims to educate and raise awareness about cybersecurity threats posed by trusted platforms.
2-10g OVH, 90-100G UDP Stable Power
Add a description, image, and links to the botnet topic page so that developers can more easily learn about it.
To associate your repository with the botnet topic, visit your repo's landing page and select "manage topics."