fennybz / Detecting-Phishing-Attack-using-ML-DL-ModelsLinks
Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processing the mails using the NLP toolkit. Built various ML models like Naïve Bayes, Random Forest, and Voting Ensemble with the best accuracy of ~72%, and deep learning model like Neural Network with an accuracy o…
☆14Updated 3 years ago
Alternatives and similar repositories for Detecting-Phishing-Attack-using-ML-DL-Models
Users that are interested in Detecting-Phishing-Attack-using-ML-DL-Models are comparing it to the libraries listed below
Sorting:
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆576Updated this week
- 🏴☠️💰 Another Ransomware gang tracker☆227Updated this week
- Live Feed of C2 servers, tools, and botnets☆675Updated this week
- Yet another Ransomware gang tracker☆463Updated this week
- This repository contains Malicious Indicator of Compromise (IOC) data, which is vital for cybersecurity professionals to enhance threat d…☆101Updated last week
- Awesome Security lists for SOC/CERT/CTI☆1,047Updated this week
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆188Updated 3 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆586Updated 3 weeks ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆695Updated 5 months ago
- The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware …☆23Updated 9 months ago
- A curated list of Awesome Threat Intelligence Blogs☆434Updated last month
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆440Updated last week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆705Updated last month
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆345Updated this week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆369Updated 2 weeks ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆226Updated last month
- Zeek-Formatted Threat Intelligence Feeds☆374Updated this week
- A production ready Dockered MISP☆256Updated last week
- Playbooks for SOC Analysts☆549Updated 2 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆52Updated 2 weeks ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,043Updated last month
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆65Updated last year
- CLI tools for forensic investigation of Windows artifacts☆344Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆93Updated last year
- Source code used at TweetFeed.live☆43Updated 2 years ago
- Indicators of Compromise☆210Updated last week
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆174Updated 3 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆196Updated last year
- A collection of phishing samples for researchers and detection developers.☆333Updated this week
- A curated list of annual cyber security reports☆576Updated this week