fennybz / Detecting-Phishing-Attack-using-ML-DL-Models
Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processing the mails using the NLP toolkit. Built various ML models like Naïve Bayes, Random Forest, and Voting Ensemble with the best accuracy of ~72%, and deep learning model like Neural Network with an accuracy o…
☆13Updated 3 years ago
Alternatives and similar repositories for Detecting-Phishing-Attack-using-ML-DL-Models:
Users that are interested in Detecting-Phishing-Attack-using-ML-DL-Models are comparing it to the libraries listed below
- Using machine learning and features extracted from email headers to detect anomalies (i.e., spam, phishing) in email datasets.☆11Updated 3 years ago
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆162Updated 9 months ago
- Anomaly based Malware Detection using Machine Learning (PE and URL)☆145Updated 2 months ago
- ☆38Updated last year
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆15Updated 4 years ago
- AI-enabled Phishing Link Detection and Alert System.☆17Updated last year
- A project that predicts a phishing URL by extracting 17 features in 3 different categories and then train and test the machine learning m…☆25Updated last year
- A collection of python cybersecurity projects☆39Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- Ransomware Detection using Machine Learning Models and Ensemble Technique☆28Updated 8 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆124Updated 10 months ago
- Harness the power of Splunk for your investigations☆99Updated 3 weeks ago
- Practical Threat Detection Engineering, Published by Packt☆68Updated last year
- This is a Malware Detection ML model made using Random Forest Algorithm☆28Updated 6 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- Advanced Threat Hunting: Ransomware Group☆20Updated 4 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆165Updated 3 weeks ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆53Updated this week
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆61Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆61Updated last year
- Projects that show my knowledge and experience of Cyber Security.☆15Updated 3 years ago
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆126Updated 10 months ago
- ☆51Updated last year
- Files used in the development of an email phishing protection application in Microsoft's Office Outlook add-in environmnet☆16Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆239Updated last month
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆18Updated last month
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆169Updated this week
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆51Updated last year