Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processing the mails using the NLP toolkit. Built various ML models like Naïve Bayes, Random Forest, and Voting Ensemble with the best accuracy of ~72%, and deep learning model like Neural Network with an accuracy o…
☆16Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for Detecting-Phishing-Attack-using-ML-DL-Models
Users that are interested in Detecting-Phishing-Attack-using-ML-DL-Models are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Files used in the development of an email phishing protection application in Microsoft's Office Outlook add-in environmnet☆16Jan 5, 2023Updated 3 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, …☆18Jun 29, 2023Updated 2 years ago
- Sandbox samples and monitor them with kunai☆29Mar 3, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Deep Learning Toolkit for Splunk☆18Mar 27, 2024Updated 2 years ago
- Turn any blog into structured threat intelligence.☆57Updated this week
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- Classifying emails into custom user labels☆26Apr 29, 2026Updated last week
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Aim of the project is to reduce phishing victims. 😇 My first-ever full-stack project marked the start of my journey as an aspiring stud…☆23Oct 2, 2024Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Oct 23, 2023Updated 2 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated 2 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆54Oct 23, 2024Updated last year
- Simple parser for Splunk Processing Language (SPL) written in Python.☆37Jun 4, 2018Updated 7 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Apr 13, 2024Updated 2 years ago
- ThePhish: an automated phishing email analysis tool☆1,334Aug 1, 2024Updated last year
- Splunk App for Data Science and Deep Learning - container images repository☆64Apr 7, 2026Updated last month
- Malicious URLs identified by scanning various public URL sources using the Google Safe Browsing API (over 6 billion URLs scanned daily)☆69May 2, 2026Updated last week
- A search command for Splunk which will allow you to search Elastic Search and display the results in the Splunk GUI☆70Aug 10, 2025Updated 9 months ago
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆194Oct 5, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆121May 26, 2025Updated 11 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆129Feb 21, 2025Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆141Apr 23, 2026Updated 2 weeks ago
- Find CVE PoCs on GitHub☆161Aug 1, 2025Updated 9 months ago
- ☆91Jul 6, 2023Updated 2 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆143Feb 25, 2024Updated 2 years ago
- An opensource sigma conversion tool built using pysigma☆164Apr 22, 2026Updated 2 weeks ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- simple YARA-based IOC scanner☆177Mar 17, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Collection of Jupyter Notebooks by @fr0gger_☆195Dec 16, 2025Updated 4 months ago
- My Privacy DNS #Matrix lists for blacklisting☆149Jan 4, 2026Updated 4 months ago
- MISP Playbooks☆225Oct 14, 2025Updated 6 months ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Aug 1, 2021Updated 4 years ago
- Sigma rules from Joe Security☆238Nov 4, 2024Updated last year
- Fast Advanced Spam Analysis Tool☆309Aug 6, 2025Updated 9 months ago