code-philia / Dynaphish
Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction
☆11Updated 3 months ago
Related projects: ⓘ
- PhishIntention: Phishing detection through webpage intention☆47Updated last month
- Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21☆120Updated this week
- Implementations of 3 phishing detection and identification baselines☆16Updated 2 years ago
- ☆22Updated 2 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆70Updated 4 years ago
- Modular static malicious JavaScript detection system☆61Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆202Updated 2 months ago
- ☆89Updated 4 years ago
- ☆18Updated 3 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆30Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆111Updated 10 months ago
- ☆70Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆150Updated last year
- Code for shelLM tool☆41Updated 9 months ago
- A framework for synthesizing lateral movement login data.☆20Updated 3 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, or text formats☆25Updated this week
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆125Updated last year
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆71Updated 5 months ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆75Updated last year
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- malicious PowerShell script detection model☆34Updated 3 years ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆106Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆37Updated 8 months ago
- System traces dataset generation tool.☆12Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆55Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆34Updated this week
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆17Updated 6 months ago
- Malware Bypass Research using Reinforcement Learning☆99Updated 4 months ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆157Updated 10 months ago
- We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.☆22Updated 2 years ago