-
Hi, would it be possible to add ranges of possibly a botnet to this list?
In recent months i found multiple sources of persistent attacks on MikroTik devices targeting open API/Winbox service, would …
-
I have placed your instruction data into the dataset for the first stage of fine-tuning, but at 27% progress, the loss seems to have become zero, and the loss has been close to zero throughout the pro…
-
Finds the Mozi botnet.
http.html_hash:-1245370368
https://www.shodan.io/search?query=http.html_hash%3A-1245370368
-
**Is your feature request related to a problem? Please describe.**
I'm using an unusual setup to avoid botnet scans. But it seems the path is fixed at /jsonrpc.
https://github.com/pawamoy/aria2p/blo…
-
Greetings
You didnt share stub source and svhost.exe??
Using as resource file.
-
When I started a botnet (1000-50000 services pseudoclients) on a test network, ZNC suddenly started to lag and I had to reconnect. Other IRC clients (weechat) don't have a problem with such a high num…
-
I've always wanted to read Waiting for Godot but my attention span doesn't last much beyond 140 chracters these days so I made a [twitter bot net](https://twitter.com/colewillsea/lists/waiting-for-gob…
-
Hi, i need your help.
1) When i read your paper. I saw you said: "All the graphs are undirected and preprocessed to have self-loops to speed up training". Besides, you also can said: "we propose to u…
-
Alright, here i'll explain why not to use Mercurial grabber.
1. It's not "open source" when you try compling it, it won't let you, there's some hidden files.
2. It's dualhooked, so everytime you…
-
```
What steps will reproduce the problem?
1.the destination can easily identify the attacks are happening from same
system by identifying hardware address of source.
2. it can be mitigated easily…