lindsey98 / PhishingBaselineLinks
Implementations of 3 phishing detection and identification baselines
☆19Updated 10 months ago
Alternatives and similar repositories for PhishingBaseline
Users that are interested in PhishingBaseline are comparing it to the libraries listed below
Sorting:
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆17Updated 2 weeks ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆35Updated 3 years ago
- ☆28Updated 3 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- A Python library for Secure and Explainable Machine Learning☆189Updated 3 months ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- ☆20Updated 3 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆168Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆165Updated 2 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆111Updated 2 years ago
- ☆82Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆189Updated 2 years ago
- List of subdomain and dynamic DNS providers☆10Updated 9 months ago
- ☆122Updated 5 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆234Updated 3 months ago
- ☆32Updated 2 years ago
- Dataset with labeled benign and malicious files 🗃️☆133Updated 2 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆141Updated 2 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆13Updated last month
- ☆25Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Updated 3 years ago
- Transformer Neural Network from Dynamic Malware Detection☆35Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆71Updated 2 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆70Updated 6 years ago
- Feature extraction for CERT insider threat test dataset☆98Updated 11 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 4 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆28Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- This project contains files for cyber security☆35Updated 6 years ago