SuryaSrikar / Phishing_Attack_Detection_With_NaturalLanguageProcessingLinks
Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person or organization. Traditionally, phishing website detection is done through the usage of blacklist databases. However, due to the current, rapid development of global networking and communication technologies, th…
☆13Updated 5 years ago
Alternatives and similar repositories for Phishing_Attack_Detection_With_NaturalLanguageProcessing
Users that are interested in Phishing_Attack_Detection_With_NaturalLanguageProcessing are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆83Updated last week
- Definition, description and relationship types of MISP objects☆99Updated last week
- A collection of resources for security data☆41Updated 7 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆54Updated 3 weeks ago
- Tools to interact with APTnotes reporting/index.☆103Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆63Updated last year
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆168Updated last year
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆151Updated 3 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆43Updated last year
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆36Updated 2 months ago
- My notes on various topics☆64Updated last year
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated 2 months ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆25Updated 7 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- STIX2 graph visualisation library in JS☆90Updated last month
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Updated 2 years ago
- Machine Learning applied to Cyber Security Course☆45Updated 5 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 8 months ago
- Specifications used in the MISP project including MISP core format☆51Updated last month
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago