jackaduma/HomoglyphAttacksDetector
Detecting Homoglyph Attacks with CNN model using Computer Vision method
This tool helps cybersecurity analysts detect "homoglyph attacks" where malicious actors use visually similar characters to spoof legitimate domain names or file names (e.g., 'svch0st.exe' instead of 'svchost.exe'). You provide a list of suspicious names, and it identifies those that are visually similar to known legitimate names, flagging potential threats. It's designed for security professionals monitoring network traffic or system processes.
No commits in the last 6 months.
Use this if you need to quickly and accurately identify spoofed domain names, file names, or process names that look legitimate but are actually malicious homoglyphs.
Not ideal if your primary concern is phishing attacks that don't rely on visual character trickery, or if you need a solution for detecting typographical errors rather than intentional malicious spoofing.
Stars
11
Forks
4
Language
Jupyter Notebook
License
MIT
Category
Last pushed
Sep 29, 2021
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/jackaduma/HomoglyphAttacksDetector"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
mandiant/stringsifter
A machine learning tool that ranks strings based on their relevance for malware analysis.
wesleyraptor/streamingphish
Python-based utility that uses supervised machine learning to detect phishing domains from the...
akamai/luda
Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a...
deepeshdm/Phishing-Attack-Domain-Detection
Identifying Malicious Phishing URLs through Machine Learning
faizann24/phishytics-machine-learning-for-phishing
Machine Learning for Phishing Website Detection