HarshOza36 / Project_X-CyberSecurityInitiativeLinks
This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB
☆14Updated 2 years ago
Alternatives and similar repositories for Project_X-CyberSecurityInitiative
Users that are interested in Project_X-CyberSecurityInitiative are comparing it to the libraries listed below
Sorting:
- Final year Project in the field of Cyber-Security☆58Updated 5 years ago
- Projects related to Information security/Cyber security/Cryptography☆30Updated 2 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆48Updated 2 years ago
- ☆15Updated 5 years ago
- Cyber Security Foundations☆34Updated 4 years ago
- A Repo to keep the CyberSecurity-IIITA projects☆16Updated 8 years ago
- In todays era, due to the surge in the usage of internet and other online platforms, security has been a major concern. Many cyber attack…☆11Updated 4 years ago
- ☆71Updated 5 years ago
- detecting phishing websites using machine learning☆45Updated 3 years ago
- This Repository contains Encryption Algorithms, Ethical Hacking Scripts, Cybersecurity Learning Resources, and Security-Based Projects. C…☆63Updated 5 years ago
- ☆17Updated 8 years ago
- It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Pyt…☆183Updated 8 months ago
- Open-source antivirus project.☆31Updated 9 years ago
- ☆18Updated 2 years ago
- A secure platform for storing of files using Hybrid Cryptography☆51Updated 3 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆80Updated 8 months ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Updated 2 months ago
- Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common C…☆22Updated 3 months ago
- ☆76Updated 5 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Updated 4 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Updated 5 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- Hacking and Learning consistently for 100 days straight af.☆18Updated 3 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆30Updated 2 years ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆34Updated 4 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Updated 3 years ago
- A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Fla…☆106Updated 3 months ago
- ☆36Updated 4 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆38Updated 2 years ago
- OSCP☆37Updated 4 years ago