lindsey98 / PhishingBaselineLinks
Implementations of 3 phishing detection and identification baselines
☆20Updated 11 months ago
Alternatives and similar repositories for PhishingBaseline
Users that are interested in PhishingBaseline are comparing it to the libraries listed below
Sorting:
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆18Updated last month
- ☆30Updated 3 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆239Updated last month
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆168Updated 4 years ago
- ☆124Updated 5 years ago
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Updated 5 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆28Updated last year
- Adversarial Malware Generator Using GANs☆55Updated last year
- Extracting Attack Behavior from Threat Reports☆79Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆172Updated 2 years ago
- ☆84Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆96Updated 2 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆13Updated 3 months ago
- ☆20Updated 3 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆199Updated 2 years ago
- ☆22Updated 5 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Updated 4 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆112Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆128Updated 7 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆102Updated last year
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Updated last year
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆74Updated last month
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- ☆16Updated 3 years ago
- A Python library for Secure and Explainable Machine Learning☆189Updated 4 months ago
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆20Updated 4 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago