01Calculates Shannon entropy for subdomain strings to identify encoded data payloads
02Analyzes query volume and unique subdomain ratios to detect tunneling behavior
03Detects common exfiltration tools including iodine, dnscat2, and Cobalt Strike
04Maps detection techniques to NIST CSF 2.0 and MITRE ATT&CK frameworks
054,120 GitHub stars
06Provides automated Python logic for processing Zeek and Suricata DNS logs