fennybz / Detecting-Phishing-Attack-using-ML-DL-ModelsLinks
Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processing the mails using the NLP toolkit. Built various ML models like Naïve Bayes, Random Forest, and Voting Ensemble with the best accuracy of ~72%, and deep learning model like Neural Network with an accuracy o…
☆16Updated 3 years ago
Alternatives and similar repositories for Detecting-Phishing-Attack-using-ML-DL-Models
Users that are interested in Detecting-Phishing-Attack-using-ML-DL-Models are comparing it to the libraries listed below
Sorting:
- Using machine learning and features extracted from email headers to detect anomalies (i.e., spam, phishing) in email datasets.☆13Updated 4 years ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆115Updated 4 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆285Updated last week
- Yet another Ransomware gang tracker☆557Updated this week
- Live Feed of C2 servers, tools, and botnets☆743Updated this week
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆441Updated this week
- A production ready Dockered MISP☆315Updated last week
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆119Updated 11 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆632Updated this week
- Indicators of Compromise☆247Updated 2 weeks ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆21Updated last week
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆471Updated 4 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Updated 9 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆629Updated 5 months ago
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆743Updated last year
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆495Updated this week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆398Updated this week
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆241Updated last year
- A collection of phishing samples for researchers and detection developers.☆391Updated last month
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 6 months ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆442Updated 3 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆201Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆278Updated 10 months ago
- This post offers a technical comparison of dark web monitoring providers, focusing on Webz.io, CyberSixGill, and DarkOwl. It highlights W…☆21Updated last year
- Playbooks for SOC Analysts☆661Updated 3 years ago
- Hands-on projects for beginners to learn and practice Windows forensics and essential cybersecurity skills☆175Updated last year
- ☆105Updated last month
- Splunk add-on related to the PurpleLab tool☆41Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 3 months ago