faizann24 / phishytics-machine-learning-for-phishingLinks
Machine Learning for Phishing Website Detection
☆56Updated 5 years ago
Alternatives and similar repositories for phishytics-machine-learning-for-phishing
Users that are interested in phishytics-machine-learning-for-phishing are comparing it to the libraries listed below
Sorting:
- Experiments to detect phishing websites using neural networks☆23Updated 5 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- detecting phishing websites using machine learning☆45Updated 3 years ago
- An anomaly-based intrusion detection system.☆86Updated 2 years ago
- My notes on various topics☆67Updated 2 years ago
- ☆24Updated 5 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 2 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
- A toolkit for Security Researchers☆129Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated 2 weeks ago
- Website crawler with YARA detection☆90Updated 2 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆50Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 4 months ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆25Updated 8 years ago
- AI: Deep Learning for Phishing URL Detection☆53Updated 2 years ago
- Python script to hunt phishing kits☆139Updated 2 years ago
- Collection of cyber security and "AI" relevant topics☆73Updated 7 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 8 years ago
- Tool to predict attacker groups from the techniques and software used☆50Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Analysis Correlation Engine☆23Updated 3 years ago
- ☆27Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago