kregg34 / EmailHeaderAnomalyDetection
Using machine learning and features extracted from email headers to detect anomalies (i.e., spam, phishing) in email datasets.
☆10Updated 3 years ago
Alternatives and similar repositories for EmailHeaderAnomalyDetection:
Users that are interested in EmailHeaderAnomalyDetection are comparing it to the libraries listed below
- Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processi…☆13Updated 3 years ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆440Updated this week
- This research project throws light on important features to look for while detecting phishing mail and also presents a comparative analys…☆11Updated 3 years ago
- OpenCTI Connectors☆428Updated this week
- Phishing URL dataset from JPCERT/CC☆172Updated last month
- A production ready Dockered MISP☆219Updated last week
- ☆36Updated last year
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆161Updated 9 months ago
- A project that predicts a phishing URL by extracting 17 features in 3 different categories and then train and test the machine learning m…☆24Updated last year
- Python API Client for TheHive☆223Updated last month
- A (nearly) production ready Dockered MISP☆231Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆710Updated 3 weeks ago
- Zeek-Formatted Threat Intelligence Feeds☆359Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆237Updated 3 weeks ago
- This repository contains Community and Field contributed content for LogScale☆209Updated last week
- ☆13Updated last month
- Docker image for MISP☆125Updated 2 weeks ago
- Python library using the MISP Rest API☆457Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆227Updated this week
- Playbooks for SOC Analysts☆442Updated 2 years ago
- Open Source Security Operations Center Documentation☆172Updated 2 weeks ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆353Updated last week
- Splunk Boss of the SOC version 3 dataset.☆324Updated 4 years ago
- Jupyter Notebook☆1,698Updated 3 months ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆13Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆285Updated this week
- Phishers Develop the websites similar to those real websites. So, this project comes to know whether the URL is phishing or not.☆10Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆555Updated last month
- MISP Docker (XME edition)☆282Updated last year
- ☆138Updated 2 years ago