fennybz / Detecting-Phishing-Attack-using-ML-DL-ModelsLinks
Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processing the mails using the NLP toolkit. Built various ML models like Naïve Bayes, Random Forest, and Voting Ensemble with the best accuracy of ~72%, and deep learning model like Neural Network with an accuracy o…
☆13Updated 3 years ago
Alternatives and similar repositories for Detecting-Phishing-Attack-using-ML-DL-Models
Users that are interested in Detecting-Phishing-Attack-using-ML-DL-Models are comparing it to the libraries listed below
Sorting:
- Awesome Security lists for SOC/CERT/CTI☆1,096Updated this week
- Live Feed of C2 servers, tools, and botnets☆693Updated this week
- 🏴☠️💰 Another Ransomware gang tracker☆247Updated last week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆720Updated last month
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆590Updated this week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆874Updated 2 months ago
- Yet another Ransomware gang tracker☆484Updated this week
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆71Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆364Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆704Updated 7 months ago
- Playbooks for SOC Analysts☆583Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆601Updated last month
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Updated 4 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆78Updated last year
- CLI tools for forensic investigation of Windows artifacts☆346Updated last month
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆710Updated 3 weeks ago
- ThePhish: an automated phishing email analysis tool☆1,265Updated last year
- ☆217Updated last year
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆109Updated last week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆376Updated last week
- A collection of phishing samples for researchers and detection developers.☆347Updated last week
- Open Source Security Operations Center Documentation☆193Updated 2 months ago
- A curated list of Awesome Threat Intelligence Blogs☆442Updated last month
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆451Updated last week
- Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IO…☆67Updated last month
- Hands-on projects on Static and Dynamic malware analysis with real-world tools.☆52Updated last year
- Using machine learning and features extracted from email headers to detect anomalies (i.e., spam, phishing) in email datasets.☆12Updated 4 years ago
- A production ready Dockered MISP☆272Updated last week
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆109Updated 6 months ago
- Ce projet vise à réduire le nombre d'attaques en bloquant les adresses IP identifiées comme abusives, agressives ou malveillantes.☆315Updated this week