code-philia / PhishLLMLinks
☆19Updated 3 weeks ago
Alternatives and similar repositories for PhishLLM
Users that are interested in PhishLLM are comparing it to the libraries listed below
Sorting:
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆61Updated this week
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆16Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆182Updated 2 years ago
- CyberMetric dataset☆91Updated 5 months ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated 3 weeks ago
- Implementations of 3 phishing detection and identification baselines☆18Updated 7 months ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆121Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆76Updated 5 months ago
- This repository provides a benchmark for prompt Injection attacks and defenses☆232Updated 3 weeks ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 9 months ago
- The automated prompt injection framework for LLM-integrated applications.☆216Updated 9 months ago
- ☆116Updated 11 months ago
- ☆24Updated 4 years ago
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆82Updated 4 months ago
- This repository holds the code for PolicyLint and PoliCheck, which identifies internal contradictions within privacy policies and analyze…☆58Updated 2 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆130Updated last year
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆40Updated 3 years ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆47Updated 3 months ago
- ☆35Updated 11 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆69Updated last year
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆96Updated last month
- Test Software for the Characterization of AI Technologies☆258Updated this week
- PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs☆28Updated 2 years ago
- ☆16Updated 2 years ago
- ☆139Updated 9 months ago
- BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆167Updated this week
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 2 years ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆163Updated 4 months ago