Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction
☆18Sep 11, 2025Updated 5 months ago
Alternatives and similar repositories for Dynaphish
Users that are interested in Dynaphish are comparing it to the libraries listed below
Sorting:
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆14Aug 6, 2025Updated 6 months ago
- Implementations of 3 phishing detection and identification baselines☆20Nov 25, 2024Updated last year
- ☆14Feb 12, 2024Updated 2 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- A Clone-Based Approach for Recommending Modification on Pasted Code☆12Jun 10, 2017Updated 8 years ago
- A project for computing differences of multiple clone instances.☆17Nov 4, 2019Updated 6 years ago
- ☆31Aug 27, 2025Updated 6 months ago
- Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21☆345Jul 26, 2025Updated 7 months ago
- PhishIntention: Phishing detection through webpage intention☆255Jan 5, 2026Updated last month
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- List of subdomain and dynamic DNS providers☆10Dec 11, 2025Updated 2 months ago
- GUIPilot: A Consistency-based Mobile GUI Testing Approach for Detecting Application-specific Bugs☆14Jan 5, 2026Updated last month
- DeepVisualInsight (DVI) is a time-travelling visualization solution for how the classification boundaries of a learned model is trained i…☆37May 6, 2024Updated last year
- a basic net/http rate limiter middleware☆13Sep 24, 2024Updated last year
- ☆12Nov 2, 2025Updated 3 months ago
- Evosuite++: an enhancement for Evosuite framework supporting new features like optimal object construction and gradient recovering☆41Dec 11, 2023Updated 2 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Website Comparison Tool☆11May 21, 2021Updated 4 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 3 years ago
- A fast and efficient way to compute a differentiable bound on the singular values of convolution layers☆12Nov 22, 2019Updated 6 years ago
- Check security aspects of a second-level domain name.☆17May 31, 2024Updated last year
- Phishing detection using GNNs (SECRYPT'22)☆15Jun 6, 2025Updated 8 months ago
- [AAAI2024] Decoupling Degradations with Recurrent Network for Video Restoration in Under-Display Camera.☆15Apr 18, 2024Updated last year
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- A feedback-based debugger for interactively recommending suspicious step in buggy program execution.☆56Mar 11, 2024Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Oct 18, 2025Updated 4 months ago
- The offcial repository for 'CharacterBERT and Self-Teaching for Improving the Robustness of Dense Retrievers on Queries with Typos', SIGI…☆16May 4, 2022Updated 3 years ago
- ☆13Jun 26, 2022Updated 3 years ago
- Hacked up scripts to perform google searches☆16Apr 26, 2024Updated last year
- An Advanced PHP Captcha Generator☆28Feb 29, 2016Updated 10 years ago
- ☆21Dec 28, 2024Updated last year
- RapidIn: Scalable Influence Estimation for Large Language Models (LLMs). The implementation for paper "Token-wise Influential Training Da…☆21May 4, 2025Updated 9 months ago
- Extensible Platform for Malware Analysis☆17Jan 14, 2021Updated 5 years ago
- cheatsheets, dotfiles, scripts...☆18Dec 28, 2025Updated 2 months ago
- Python asyncio-based library that implements the SPAMC/SPAMD client protocol used by SpamAssassin.☆17Updated this week
- An image search engine made using python GUI, that extracts and stores features from images in database in the form of color correlogram …☆18Nov 19, 2021Updated 4 years ago
- MODE: Automated Neural Network Model Debugging via State Differential Analysis and Input Selection - Replication Project☆16Mar 24, 2023Updated 2 years ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year