kregg34 / EmailHeaderAnomalyDetectionLinks
Using machine learning and features extracted from email headers to detect anomalies (i.e., spam, phishing) in email datasets.
☆12Updated 4 years ago
Alternatives and similar repositories for EmailHeaderAnomalyDetection
Users that are interested in EmailHeaderAnomalyDetection are comparing it to the libraries listed below
Sorting:
- Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processi…☆14Updated 3 years ago
- This is a Malware Detection ML model made using Random Forest Algorithm☆37Updated last year
- Phishing URL dataset from JPCERT/CC☆192Updated 2 months ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 3 years ago
- Anomaly based Malware Detection using Machine Learning (PE and URL)☆172Updated 9 months ago
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆204Updated last year
- Ransomware Detection using Machine Learning Models and Ensemble Technique☆35Updated last year
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆525Updated 6 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆737Updated last week
- A python module for working with ATT&CK☆621Updated last week
- ☆29Updated 3 months ago
- Public datasets to help you address various cyber security problems.☆455Updated 3 years ago
- ☆45Updated 2 years ago
- STIX data representing MITRE ATT&CK☆471Updated last week
- A project that predicts a phishing URL by extracting 17 features in 3 different categories and then train and test the machine learning m…☆28Updated last year
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,100Updated this week
- Zeek-Formatted Threat Intelligence Feeds☆378Updated last week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆717Updated 9 months ago
- ☆31Updated last year
- 脆弱性トリアージガイドライン作成の手引き☆27Updated 9 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆208Updated this week
- A custom GUI based NIDS (Network Intrusion Detection System) with stream follow capability for HTTP2 and TLS/TCP☆11Updated last year
- This project will determine which of the five supervised classification machine learning algorithms performs best in detecting phishy ema…☆47Updated 2 years ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆398Updated this week
- ログ分析トレーニング用コンテンツ☆94Updated 5 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆602Updated last week
- Awesome Security lists for SOC/CERT/CTI☆1,165Updated this week
- A production ready Dockered MISP☆289Updated this week
- ☆56Updated 2 years ago
- 🏴☠️💰 Another Ransomware gang tracker☆264Updated last month