code-philia / Dynaphish
Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction
☆16Updated 10 months ago
Alternatives and similar repositories for Dynaphish:
Users that are interested in Dynaphish are comparing it to the libraries listed below
- Implementations of 3 phishing detection and identification baselines☆17Updated 4 months ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated 3 weeks ago
- ☆25Updated 3 years ago
- ☆16Updated 6 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆120Updated last year
- A project for computing differences of multiple clone instances.☆17Updated 5 years ago
- A Clone-Based Approach for Recommending Modification on Pasted Code☆12Updated 7 years ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆85Updated last week
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated 2 years ago
- A word2vec model trained over Vulners☆17Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆101Updated last year
- Some simple codes to format the CSDMC2010 SPAM corpus☆10Updated 8 years ago
- ☆29Updated last year
- ☆76Updated 2 years ago
- ☆22Updated 3 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆123Updated 2 years ago
- ☆29Updated 2 weeks ago
- Evosuite++: an enhancement for Evosuite framework supporting new features like optimal object construction and gradient recovering☆43Updated last year
- Syntactic detection of malicious (obfuscated) JavaScript files☆81Updated 5 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆46Updated 7 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆178Updated last year
- Graphics, icons, and diagrams to support STIX 2☆46Updated 3 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆178Updated this week
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆26Updated 4 years ago
- ☆67Updated 3 years ago
- ☆19Updated 3 years ago
- ☆105Updated 4 years ago
- ☆34Updated 6 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆23Updated last year