sjbell / phishalytics
Measurement system I built during my PhD to collect and analyse large-scale datasets; including phishing and malware attacks on Twitter, blacklist characterisation, and phishing detection capabilities of web browsers.
☆15Updated 3 years ago
Alternatives and similar repositories for phishalytics:
Users that are interested in phishalytics are comparing it to the libraries listed below
- Machine Learning applied to Cyber Security Course☆43Updated 5 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- ☆20Updated 6 years ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22Updated 11 months ago
- Cisco Threat Intelligence API☆70Updated this week
- Cisco Threat Intellligence Model☆69Updated 2 months ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- AI featured threat modeling and security review project☆16Updated 5 months ago
- For storing of the volumes☆4Updated 5 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- PhishDetect is a library to help identify phishing pages☆107Updated last year
- Container Security Verification Standard☆58Updated 5 years ago
- Hands-On Network Forensics by Nipun Jaswal☆46Updated last year
- Updated incident response generator for training classes☆44Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆49Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Updated 4 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Privacy Cards for Software Developers☆52Updated 5 years ago
- Slides from presentations I give!☆25Updated last week
- ☆21Updated 5 years ago
- ☆18Updated 5 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆50Updated 9 months ago
- Assorted tools for security-related task for git repositories☆59Updated 3 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- A simple file-based scanner to look for potential AWS access and secret keys in files☆91Updated last year