SuryaSrikar / Phishing_Attack_Detection_With_NaturalLanguageProcessingLinks
Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person or organization. Traditionally, phishing website detection is done through the usage of blacklist databases. However, due to the current, rapid development of global networking and communication technologies, th…
☆14Updated 5 years ago
Alternatives and similar repositories for Phishing_Attack_Detection_With_NaturalLanguageProcessing
Users that are interested in Phishing_Attack_Detection_With_NaturalLanguageProcessing are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 3 months ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆126Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆97Updated 5 months ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆156Updated 6 months ago
- Definition, description and relationship types of MISP objects☆102Updated this week
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- STIX2 graph visualisation library in JS☆91Updated 4 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 10 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
- Tools to interact with APTnotes reporting/index.☆105Updated 5 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆172Updated last year
- Zeek Training Materials/Products☆40Updated 2 weeks ago
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 3 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Updated 3 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- State of vulnerabilties report☆11Updated 5 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆76Updated last month
- TAXII server implementation in Python from EclecticIQ☆207Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Collection of Snort 2/3 rules.☆39Updated 7 years ago
- Awesome Cyber-Security Data-sets Collection☆20Updated 7 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Suricata rules for network anomaly detection☆175Updated 2 weeks ago
- A collection of resources for security data☆41Updated 7 years ago