code-philia / DynaphishLinks
Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction
☆18Updated 4 months ago
Alternatives and similar repositories for Dynaphish
Users that are interested in Dynaphish are comparing it to the libraries listed below
Sorting:
- Implementations of 3 phishing detection and identification baselines☆20Updated last year
- ☆30Updated 3 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆15Updated 6 months ago
- Modular static malicious JavaScript detection system☆75Updated 5 years ago
- List of subdomain and dynamic DNS providers☆10Updated last month
- PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models☆14Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- ☆38Updated last year
- ☆78Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 6 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Updated 4 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆37Updated 3 years ago
- A project for computing differences of multiple clone instances.☆17Updated 6 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆301Updated this week
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆135Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆179Updated 2 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Updated 9 years ago
- ☆132Updated 5 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Updated 2 months ago
- Extracting Attack Behavior from Threat Reports☆81Updated 2 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Updated 3 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆173Updated 5 years ago
- A Python library for Secure and Explainable Machine Learning☆190Updated 7 months ago
- A Clone-Based Approach for Recommending Modification on Pasted Code☆12Updated 8 years ago
- ☆22Updated 5 years ago
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆103Updated 9 months ago
- ☆14Updated last year