code-philia / Dynaphish
Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction
☆14Updated 7 months ago
Alternatives and similar repositories for Dynaphish:
Users that are interested in Dynaphish are comparing it to the libraries listed below
- Implementations of 3 phishing detection and identification baselines☆17Updated 2 months ago
- ☆12Updated 11 months ago
- ☆15Updated 3 months ago
- malicious PowerShell script detection model☆36Updated 3 years ago
- ☆24Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆41Updated 3 months ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆33Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆48Updated 8 months ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆78Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆75Updated 10 months ago
- ☆34Updated 5 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆209Updated last week
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- ☆21Updated 3 years ago
- A project for computing differences of multiple clone instances.☆17Updated 5 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆155Updated 4 years ago
- ☆98Updated 4 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- ☆18Updated 3 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆24Updated 11 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆63Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆37Updated last year
- Malware Bypass Research using Reinforcement Learning☆103Updated 9 months ago
- A Clone-Based Approach for Recommending Modification on Pasted Code☆12Updated 7 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆79Updated last year
- ☆28Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆146Updated last year
- Evosuite++: an enhancement for Evosuite framework supporting new features like optimal object construction and gradient recovering☆42Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆14Updated 3 years ago