jackaduma/HomoglyphAttacksDetector

Detecting Homoglyph Attacks with CNN model using Computer Vision method

36
/ 100
Emerging

This tool helps cybersecurity analysts detect "homoglyph attacks" where malicious actors use visually similar characters to spoof legitimate domain names or file names (e.g., 'svch0st.exe' instead of 'svchost.exe'). You provide a list of suspicious names, and it identifies those that are visually similar to known legitimate names, flagging potential threats. It's designed for security professionals monitoring network traffic or system processes.

No commits in the last 6 months.

Use this if you need to quickly and accurately identify spoofed domain names, file names, or process names that look legitimate but are actually malicious homoglyphs.

Not ideal if your primary concern is phishing attacks that don't rely on visual character trickery, or if you need a solution for detecting typographical errors rather than intentional malicious spoofing.

cybersecurity threat-detection security-operations malware-analysis network-security
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 5 / 25
Maturity 16 / 25
Community 15 / 25

How are scores calculated?

Stars

11

Forks

4

Language

Jupyter Notebook

License

MIT

Last pushed

Sep 29, 2021

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/jackaduma/HomoglyphAttacksDetector"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.