code-philia / DynaphishLinks
Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction
☆18Updated 4 months ago
Alternatives and similar repositories for Dynaphish
Users that are interested in Dynaphish are comparing it to the libraries listed below
Sorting:
- Implementations of 3 phishing detection and identification baselines☆20Updated last year
- ☆29Updated 3 years ago
- Modular static malicious JavaScript detection system☆75Updated 4 years ago
- List of subdomain and dynamic DNS providers☆10Updated last month
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆15Updated 5 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆130Updated 2 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Updated 9 years ago
- Code for shelLM tool☆57Updated 11 months ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Updated last year
- ☆31Updated 4 months ago
- ☆21Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆109Updated last year
- ☆38Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆242Updated last month
- ☆79Updated 2 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- ☆78Updated 4 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆204Updated 2 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- A Clone-Based Approach for Recommending Modification on Pasted Code☆12Updated 8 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆42Updated 8 months ago
- ☆21Updated 4 years ago
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆102Updated 8 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆175Updated 2 years ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆312Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆89Updated last year
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆15Updated 2 months ago
- Extracting Attack Behavior from Threat Reports☆80Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆27Updated 2 years ago