Khuzd / PhishGan
URL phishing detection using Generative Adversarial Network (GAN)
☆15Updated 2 years ago
Alternatives and similar repositories for PhishGan:
Users that are interested in PhishGan are comparing it to the libraries listed below
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 2 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆33Updated 6 years ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Updated 4 years ago
- ☆15Updated 8 years ago
- ☆55Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- CTI database generator and public dataset☆21Updated 5 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆13Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishi…☆60Updated 3 years ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Updated 4 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- AI: Deep Learning for Phishing URL Detection☆48Updated 2 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆12Updated 2 years ago
- Malicious Web Sites Detection using Suspicious URL☆73Updated 4 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆157Updated 4 years ago
- Insider Threat Detection using Isolation Forest☆16Updated 6 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆97Updated last year
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Machine Learning For Cybersecurity.☆64Updated 5 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 7 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆26Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- Corpus of auto-labeled text for the cyber security domain☆93Updated 5 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago
- Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing…☆62Updated last year
- NLP model and tech for cyber security tasks☆85Updated last year
- A collection of resources for security data☆40Updated 7 years ago