SuryaSrikar / Phishing_Attack_Detection_With_NaturalLanguageProcessing
Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person or organization. Traditionally, phishing website detection is done through the usage of blacklist databases. However, due to the current, rapid development of global networking and communication technologies, th…
☆13Updated 4 years ago
Alternatives and similar repositories for Phishing_Attack_Detection_With_NaturalLanguageProcessing:
Users that are interested in Phishing_Attack_Detection_With_NaturalLanguageProcessing are comparing it to the libraries listed below
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated last month
- Awesome Cyber-Security Data-sets Collection☆19Updated 6 years ago
- Definition, description and relationship types of MISP objects☆94Updated last week
- Machine Learning applied to Cyber Security Course☆41Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Seamless Threat Intelligence Platform☆47Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆89Updated this week
- Specifications used in the MISP project including MISP core format☆51Updated 3 weeks ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆100Updated 5 years ago
- AI: Deep Learning for Phishing URL Detection☆48Updated 2 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆60Updated 5 months ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆33Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆34Updated last month
- Documentation for Zeek☆50Updated last week
- Graphics, icons, and diagrams to support STIX 2☆44Updated 3 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆39Updated 3 months ago
- A tool to extract structured cyber information from incident reports.☆79Updated 6 years ago
- Collection of Snort 2/3 rules.☆34Updated 6 years ago
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆119Updated 2 months ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 3 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆34Updated this week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- A collection of resources for security data☆40Updated 7 years ago
- DGA-generated domain detection using deep learning models☆23Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 3 weeks ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆33Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 9 months ago