imethanlee / KnowPhishLinks
[USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection'
☆12Updated last week
Alternatives and similar repositories for KnowPhish
Users that are interested in KnowPhish are comparing it to the libraries listed below
Sorting:
- ☆35Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 3 months ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Updated 11 months ago
- CyberAttack Sensing and Information Extraction☆70Updated 7 months ago
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆127Updated last year
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆34Updated 3 years ago
- ☆15Updated 2 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- ☆45Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆157Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆75Updated last year
- ☆47Updated 10 months ago
- ☆46Updated last year
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆186Updated 2 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆48Updated 4 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated last year
- ☆120Updated last year
- TensorFlow API analysis tool and malicious model detection tool☆33Updated 2 months ago
- An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆95Updated 6 months ago
- AI Model Security Reading Notes☆39Updated 5 months ago
- Detecting software vulnerability described public security reports with minimal training examples☆13Updated 4 years ago
- CTINexus is a framework that leverages optimized in-context learning of LLMs to enable data-efficient extraction of cyber threat intellig…☆39Updated last week
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆71Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆82Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆43Updated 2 years ago
- Have fun with audit log analysis :)☆152Updated last year