0xp0tato / Phishing-Url-Detection-Using-Machine-LearningLinks
A machine learning approach to detect phishing urls
☆28Updated 3 years ago
Alternatives and similar repositories for Phishing-Url-Detection-Using-Machine-Learning
Users that are interested in Phishing-Url-Detection-Using-Machine-Learning are comparing it to the libraries listed below
Sorting:
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- a Machine Learning powered CSRF attacks finding tool☆26Updated 6 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 6 years ago
- Collection of AI and Security Papers☆27Updated 5 years ago
- https://www.cdxy.me/?p=806☆31Updated 6 years ago
- Python library to extract potential IOCs from a pcap file☆10Updated 6 years ago
- A tool for malicious behavior detection in IoT devices☆76Updated 6 years ago
- ☆13Updated 2 years ago
- Recurrent neural networks in predicting security exploits☆22Updated 8 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Updated 8 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- TAP: A Static Analysis Model for PHP Vulnerabilities Based on Token and Deep Learning Technology☆14Updated 5 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆27Updated 6 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆32Updated 6 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 5 years ago
- Some of the presentations given by me☆18Updated 8 months ago
- Windows log and threat hunting with powershell☆16Updated 4 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- ☆24Updated 5 years ago
- ☆29Updated 4 years ago
- Botnet Simulation Framework☆77Updated 4 years ago
- Run-time trojan attack on neural networks☆26Updated 6 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- A simple script for quickly mining sensitive information in binary files.☆29Updated 4 years ago
- ☆23Updated 6 years ago
- homemade-CTF-challenges☆23Updated 7 years ago
- Modeling Password Guessability Using Markov Models☆57Updated 6 years ago