code-philia / DynaphishLinks
Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction
☆16Updated last year
Alternatives and similar repositories for Dynaphish
Users that are interested in Dynaphish are comparing it to the libraries listed below
Sorting:
- Implementations of 3 phishing detection and identification baselines☆19Updated 8 months ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated last month
- ☆26Updated 3 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Updated 8 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- ☆21Updated this week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆212Updated this week
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆127Updated 2 years ago
- Phishing detection using GNNs (SECRYPT'22)☆13Updated last month
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆154Updated 2 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆229Updated last month
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆41Updated 3 weeks ago
- ☆114Updated 5 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 10 months ago
- Have fun with audit log analysis :)☆153Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- ☆72Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆82Updated last year
- ☆37Updated 11 months ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆97Updated 2 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆95Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆81Updated 2 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 2 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆70Updated last year
- ☆35Updated last month
- ☆79Updated 2 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆75Updated 3 years ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆167Updated this week