kregg34 / EmailHeaderAnomalyDetectionLinks
Using machine learning and features extracted from email headers to detect anomalies (i.e., spam, phishing) in email datasets.
☆13Updated 4 years ago
Alternatives and similar repositories for EmailHeaderAnomalyDetection
Users that are interested in EmailHeaderAnomalyDetection are comparing it to the libraries listed below
Sorting:
- Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processi…☆16Updated 3 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆764Updated 3 months ago
- OpenCTI Connectors☆514Updated this week
- A project that predicts a phishing URL by extracting 17 features in 3 different categories and then train and test the machine learning m…☆30Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆745Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆463Updated this week
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆545Updated 9 months ago
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆213Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆634Updated this week
- Phishing URL dataset from JPCERT/CC☆197Updated 2 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,179Updated this week
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆720Updated last year
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,621Updated this week
- ☆50Updated 2 years ago
- A production ready Dockered MISP☆320Updated 3 weeks ago
- STIX data representing MITRE ATT&CK☆525Updated last month
- A python module for working with ATT&CK☆654Updated last week
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆522Updated last week
- Python Cybersecurity for Beginners (YT Series)☆37Updated last year
- Playbooks for SOC Analysts☆670Updated 3 years ago
- 脆弱性トリアージガイドライン作成の手引き☆30Updated last year
- Yet another Ransomware gang tracker☆558Updated this week
- ☆31Updated 2 years ago
- Anomaly based Malware Detection using Machine Learning (PE and URL)☆179Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆443Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,207Updated last month
- A repository of curated datasets from various attacks☆726Updated this week
- ThePhish: an automated phishing email analysis tool☆1,324Updated last year
- timewrap is a terminal-based tool that visualizes your lifespan in days. It helps you see how much of your time has been spent on sleep a…☆16Updated 6 months ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆934Updated last year