bfilar / URLTran
PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers
☆33Updated 2 years ago
Alternatives and similar repositories for URLTran:
Users that are interested in URLTran are comparing it to the libraries listed below
- NLP model and tech for cyber security tasks☆85Updated last year
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆168Updated last year
- Implementations of 3 phishing detection and identification baselines☆17Updated last month
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆60Updated 5 years ago
- AI: Deep Learning for Phishing URL Detection☆48Updated 2 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆154Updated 4 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆95Updated last year
- Multi-class malware classification using Deep Learning☆75Updated 4 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆78Updated 5 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- ☆74Updated last year
- Cyber Attack Detection thanks to Machine Learning Algorithms☆100Updated 4 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆30Updated 2 years ago
- ☆28Updated 4 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆20Updated 4 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 6 months ago
- Machine Learning for Phishing Website Detection☆55Updated 4 years ago
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆13Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆145Updated last year
- A neural approach to malware detection in portable executables☆78Updated last year
- ☆97Updated 4 years ago
- State of vulnerabilties report☆10Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆75Updated 9 months ago
- A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆73Updated last year
- ☆18Updated 3 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆161Updated last year
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆43Updated 9 months ago