A machine learning approach to detect phishing urls
☆30Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for Phishing-Url-Detection-Using-Machine-Learning
Users that are interested in Phishing-Url-Detection-Using-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆134Jun 13, 2021Updated 4 years ago
- 基于Opendaylight的packet-in flooding攻击的防护☆11Mar 25, 2019Updated 6 years ago
- notes about GNNs☆11Apr 8, 2019Updated 6 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- 基于attention的CNN文本分类☆15Dec 8, 2022Updated 3 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- ☆23Apr 6, 2019Updated 6 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆24Oct 2, 2018Updated 7 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Dec 6, 2020Updated 5 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆28Jul 4, 2020Updated 5 years ago
- 漏洞测试环境 - 方便写扫描器利用复现☆27Aug 12, 2019Updated 6 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Jul 23, 2025Updated 7 months ago
- My CTF Writeup☆28Nov 20, 2024Updated last year
- ☆22Aug 31, 2016Updated 9 years ago
- ☆37Dec 10, 2017Updated 8 years ago
- shiro_rememberme 反序列化漏洞 利用EXP☆30Nov 22, 2019Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- Basic NLP Toolkits include text classification, sequence labeling etc.☆39Aug 2, 2024Updated last year
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- YSOSERIAL Integration with burp suite☆41Feb 10, 2022Updated 4 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- 与反病毒软件老大哥们的打闹日常☆135Nov 8, 2018Updated 7 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago