kregg34 / EmailHeaderAnomalyDetectionLinks
Using machine learning and features extracted from email headers to detect anomalies (i.e., spam, phishing) in email datasets.
☆12Updated 3 years ago
Alternatives and similar repositories for EmailHeaderAnomalyDetection
Users that are interested in EmailHeaderAnomalyDetection are comparing it to the libraries listed below
Sorting:
- Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processi…☆14Updated 3 years ago
- A project that predicts a phishing URL by extracting 17 features in 3 different categories and then train and test the machine learning m…☆26Updated last year
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆176Updated last year
- Anomaly based Malware Detection using Machine Learning (PE and URL)☆154Updated 5 months ago
- Phishing URL dataset from JPCERT/CC☆181Updated 2 months ago
- Phishing detection using GNNs (SECRYPT'22)☆13Updated last month
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆20Updated last week
- ☆31Updated last year
- ☆312Updated 3 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆510Updated 2 months ago
- Identifying Malicious Phishing URLs through Machine Learning☆51Updated last year
- SOC Analyst Level 1 Replacement using RAG LLM☆23Updated 11 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- ☆36Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆374Updated this week
- RBA is Splunk's method to aggregate low-fidelity security events as interesting observations tagged with security metadata to create high…☆56Updated 2 weeks ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆476Updated this week
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆16Updated last year
- Splunk Boss of the SOC version 3 dataset.☆352Updated 5 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆260Updated 4 months ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆576Updated this week
- ☆51Updated last year
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆55Updated 6 years ago
- Phishing website detection system provides strong security mechanism to detect and prevent phishing domains from reaching user. This proj…☆41Updated 6 years ago
- A production ready Dockered MISP☆256Updated last week
- This is a Malware Detection ML model made using Random Forest Algorithm☆30Updated 9 months ago
- My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP request…☆23Updated last year
- STIX data representing MITRE ATT&CK☆429Updated 2 months ago
- DDIR: An Open Source Dataset for Darkweb Research☆15Updated 5 years ago
- Enhance your cybersecurity skills with comprehensive notes for SOC Analysts. Dive into security operations, incident response, threat hun…☆35Updated 5 months ago