lindsey98 / PhishIntention

PhishIntention: Phishing detection through webpage intention
MIT License
47 stars 13 forks source link

replace old target-list with new target-list #16

Open lindsey98 opened 1 year ago

lindsey98 commented 1 year ago

Recently, we have expanded our targetlist to include 2K+ targets.

The new expand_targetlist.zip: https://drive.google.com/file/d/105qPU_MbvPH0Y2X6YiDvOYc5pnDeGv1R/view?usp=share_link The new domain_map.pkl: https://drive.google.com/file/d/1DeoI1pjkEcPWDNAO6kTlLin0UIUZfF1Y/view?usp=share_link

Step 1: Find where the PhishIntention package is installed, e.g. /anaconda3/envs/.../lib/python3.7/site-packages/phishintention

Step 2: Goto the PhishIntention package directory, and delete LOGO_FILES.npy, LOGO_FEATS.npy, if they exist.

Step 3: Goto the PhishIntention package directory, go to src/phishpedia_siamese

Step 4: Set reload_targetlist = True the FIRST time when you call _loadconfig() function. You can set it to False thereafter.

AWL_MODEL, CRP_CLASSIFIER, CRP_LOCATOR_MODEL, SIAMESE_MODEL, OCR_MODEL, SIAMESE_THRE, LOGO_FEATS, LOGO_FILES, DOMAIN_MAP_PATH = load_config(cfg_path, reload_targetlist=True)
imethanlee commented 1 year ago

Hi,

The new domain map seems like lacking some of the brands. For example, 'girlswithmuscle' is in the target list but not in the domain_map.keys(). image

nirav0999 commented 9 months ago

@lindsey98 The new expand_targetlist.zip link is not opening. Can you check out the link once?