lindsey98 / Phishpedia
Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21
☆124Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for Phishpedia
- PhishIntention: Phishing detection through webpage intention☆47Updated 2 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆55Updated 6 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆137Updated last year
- ☆18Updated 3 years ago
- Implementations of 3 phishing detection and identification baselines☆16Updated 2 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆27Updated last month
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆158Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆115Updated 11 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆71Updated 3 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆39Updated 3 weeks ago
- ☆73Updated last year
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆12Updated 5 months ago
- This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)☆170Updated last year
- ☆96Updated 4 years ago
- Code for shelLM tool☆44Updated last week
- Source code used at TweetFeed.live☆37Updated last year
- NLP model and tech for cyber security tasks☆78Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆87Updated 4 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆19Updated last year
- A framework for synthesizing lateral movement login data.☆20Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆35Updated last month
- malicious PowerShell script detection model☆36Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆80Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆102Updated 6 months ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆158Updated 11 months ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆447Updated 5 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆112Updated last year
- ☆22Updated last year