ANG13T / url_genie
Malicious URL Detection Model NN optimized by Genetic Algorithms π§¬
β30Updated last year
Alternatives and similar repositories for url_genie:
Users that are interested in url_genie are comparing it to the libraries listed below
- Free training course offered at Hack Space Con 2023β136Updated last year
- Malware Detection using Machine Learning (MDML)β48Updated 2 years ago
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance πΈβ49Updated last month
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!β58Updated last year
- Graphical map of known Advanced Persistent Threatsβ47Updated last year
- β62Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β116Updated 9 months ago
- Capture screenshots of onion services on an onion service.β50Updated 7 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious dβ¦β37Updated last year
- β63Updated last year
- Rules shared by the community from 100 Days of YARA 2024β83Updated 2 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β59Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.β59Updated 2 years ago
- Security Operation Center Labβ16Updated 3 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, techniqueβ¦β99Updated 5 months ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive securityβ94Updated 6 months ago
- A repository of credential stealer formatsβ129Updated this week
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.β27Updated 8 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β98Updated last year
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file hβ¦β84Updated last week
- PowerShell Script Analyzerβ67Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLsβ¦β49Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.β86Updated 9 months ago
- Just some lists of Malware Configsβ168Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesβ123Updated 7 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reportsβ77Updated this week
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.β68Updated last week
- β131Updated last year