fennybz / Detecting-Phishing-Attack-using-ML-DL-Models
Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processing the mails using the NLP toolkit. Built various ML models like Naïve Bayes, Random Forest, and Voting Ensemble with the best accuracy of ~72%, and deep learning model like Neural Network with an accuracy o…
☆13Updated 3 years ago
Alternatives and similar repositories for Detecting-Phishing-Attack-using-ML-DL-Models:
Users that are interested in Detecting-Phishing-Attack-using-ML-DL-Models are comparing it to the libraries listed below
- Using machine learning and features extracted from email headers to detect anomalies (i.e., spam, phishing) in email datasets.☆10Updated 3 years ago
- Projects that show my knowledge and experience of Cyber Security.☆15Updated 3 years ago
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆158Updated 8 months ago
- ☆33Updated last year
- This is a Malware Detection ML model made using Random Forest Algorithm☆28Updated 5 months ago
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆15Updated 4 years ago
- A project that predicts a phishing URL by extracting 17 features in 3 different categories and then train and test the machine learning m…☆24Updated last year
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆25Updated 9 months ago
- A collection of python cybersecurity projects☆38Updated last year
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆120Updated 9 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆120Updated 10 months ago
- Phishers use the websites which are visually similar to those real websites. So, we developed this website so that user can know whether …☆18Updated 10 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆48Updated 2 months ago
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆60Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆107Updated this week
- Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly…☆20Updated last year
- Network security related project collection.☆63Updated 5 years ago
- AI-enabled Phishing Link Detection and Alert System.☆17Updated last year
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆50Updated last year
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controll…☆97Updated last month
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆101Updated 7 months ago
- Splunk add-on related to the PurpleLab tool☆38Updated 11 months ago
- Yet another Ransomware gang tracker☆402Updated last week
- ☆47Updated last month
- Harness the power of Splunk for your investigations☆95Updated this week
- A collection of introductory cybersecurity projects that I have completed in my spare time.☆32Updated 2 years ago
- I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilitie…☆90Updated this week
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆16Updated 11 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆88Updated last month