bfilar / URLTran
PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers
☆33Updated 2 years ago
Alternatives and similar repositories for URLTran:
Users that are interested in URLTran are comparing it to the libraries listed below
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆97Updated last year
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- NLP model and tech for cyber security tasks☆85Updated last year
- Implementations of 3 phishing detection and identification baselines☆17Updated 2 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆170Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆83Updated 7 months ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆26Updated 4 years ago
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆13Updated 4 years ago
- AI: Deep Learning for Phishing URL Detection☆48Updated 2 years ago
- Multi-class malware classification using Deep Learning☆76Updated 4 years ago
- ☆75Updated last year
- ☆31Updated 4 years ago
- Transfer Learning for Image-Based Malware Classification☆46Updated 2 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆157Updated 4 years ago
- ☆100Updated 4 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆44Updated 5 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆62Updated 5 years ago
- CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK Techniques☆20Updated 2 years ago
- A neural approach to malware detection in portable executables☆79Updated last year
- Chrome extension for detecting phishing web sites☆242Updated 4 years ago
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆15Updated 3 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆30Updated 2 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆64Updated last year
- ☆21Updated 3 years ago
- Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishi…☆60Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 7 months ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…