SuryaSrikar / Phishing_Attack_Detection_With_NaturalLanguageProcessingLinks
Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person or organization. Traditionally, phishing website detection is done through the usage of blacklist databases. However, due to the current, rapid development of global networking and communication technologies, th…
☆13Updated 5 years ago
Alternatives and similar repositories for Phishing_Attack_Detection_With_NaturalLanguageProcessing
Users that are interested in Phishing_Attack_Detection_With_NaturalLanguageProcessing are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 10 months ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆104Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- A collection of resources for security data☆41Updated 7 years ago
- AI: Deep Learning for Phishing URL Detection☆52Updated 2 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆78Updated 7 years ago
- A machine learning approach to detect phishing urls☆28Updated 2 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 2 years ago
- Graphics, icons, and diagrams to support STIX 2☆46Updated 4 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- Collection of Snort 2/3 rules.☆36Updated 7 years ago
- DGA Detection with ML and DL☆48Updated 5 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆123Updated last year
- Cyber Threat Intelligence Feeds☆97Updated 8 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆18Updated 4 years ago
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆157Updated 8 months ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- ☆111Updated 5 years ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆29Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆95Updated 11 months ago
- zeek-scripts☆44Updated 6 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 3 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆52Updated 3 months ago
- Definition, description and relationship types of MISP objects☆99Updated this week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆90Updated last week
- Machine Learning applied to Cyber Security Course☆44Updated 5 years ago