code-philia / DynaphishLinks
Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction
☆16Updated last year
Alternatives and similar repositories for Dynaphish
Users that are interested in Dynaphish are comparing it to the libraries listed below
Sorting:
- Implementations of 3 phishing detection and identification baselines☆18Updated 7 months ago
- ☆25Updated 3 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated 3 weeks ago
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- ☆19Updated 3 weeks ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- ☆111Updated 5 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆82Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆80Updated 2 years ago
- ☆22Updated 5 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Updated 8 years ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆96Updated last month
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆211Updated last week
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 9 months ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆75Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆52Updated last year
- JavaScript Transformation Techniques Detection☆10Updated 4 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆40Updated 2 months ago
- A Clone-Based Approach for Recommending Modification on Pasted Code☆12Updated 8 years ago
- Material from the DARPA Transparent Computing Program☆194Updated 5 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- Have fun with audit log analysis :)☆153Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆93Updated 11 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆123Updated last year
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆93Updated last year
- A project for computing differences of multiple clone instances.☆17Updated 5 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Updated 5 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆182Updated 2 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆25Updated last year