lindsey98 / PhishingBaselineLinks
Implementations of 3 phishing detection and identification baselines
☆19Updated 8 months ago
Alternatives and similar repositories for PhishingBaseline
Users that are interested in PhishingBaseline are comparing it to the libraries listed below
Sorting:
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆16Updated last year
- ☆26Updated 3 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 2 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated last week
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆167Updated 4 years ago
- ☆22Updated 5 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Updated last year
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆106Updated last year
- A Python library for Secure and Explainable Machine Learning☆184Updated last month
- ☆22Updated 3 weeks ago
- ☆20Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- ☆116Updated 5 years ago
- ☆28Updated 2 years ago
- Phishing detection using GNNs (SECRYPT'22)☆14Updated 2 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆93Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆157Updated 2 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 4 years ago
- ☆79Updated 2 years ago
- ☆25Updated 3 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- Adversarial Malware Generator Using GANs☆54Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆140Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- Bad Characters: Imperceptible NLP Attacks☆35Updated last year
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆230Updated last month
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆185Updated 2 years ago