SuryaSrikar / Phishing_Attack_Detection_With_NaturalLanguageProcessingLinks
Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person or organization. Traditionally, phishing website detection is done through the usage of blacklist databases. However, due to the current, rapid development of global networking and communication technologies, th…
☆14Updated 5 years ago
Alternatives and similar repositories for Phishing_Attack_Detection_With_NaturalLanguageProcessing
Users that are interested in Phishing_Attack_Detection_With_NaturalLanguageProcessing are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 3 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 4 months ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Updated 2 years ago
- Definition, description and relationship types of MISP objects☆103Updated last week
- Awesome Cyber-Security Data-sets Collection☆20Updated 7 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Updated 3 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆97Updated 5 months ago
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆127Updated 2 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆49Updated 8 years ago
- Tools to interact with APTnotes reporting/index.☆106Updated 5 years ago
- STIX2 graph visualisation library in JS☆92Updated 2 weeks ago
- A collection of resources for security data☆41Updated 8 years ago
- MISP website (hugo-based)☆25Updated this week
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆52Updated 2 weeks ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 11 months ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 5 years ago
- AI: Deep Learning for Phishing URL Detection☆53Updated 2 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆46Updated 3 years ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- Collection of cyber security and "AI" relevant topics☆73Updated 7 years ago
- Cyber Threat Intelligence Feeds☆96Updated 9 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆174Updated 2 years ago