HarshOza36 / Project_X-CyberSecurityInitiativeLinks
This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB
☆15Updated 2 years ago
Alternatives and similar repositories for Project_X-CyberSecurityInitiative
Users that are interested in Project_X-CyberSecurityInitiative are comparing it to the libraries listed below
Sorting:
- Final year Project in the field of Cyber-Security☆57Updated 5 years ago
- In todays era, due to the surge in the usage of internet and other online platforms, security has been a major concern. Many cyber attack…☆11Updated 4 years ago
- Projects related to Information security/Cyber security/Cryptography☆29Updated last year
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- Cyber Security Foundations☆35Updated 4 years ago
- It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Pyt…☆178Updated 7 months ago
- ☆15Updated 5 years ago
- ☆24Updated 5 years ago
- ☆22Updated 4 years ago
- Open-source antivirus project.☆31Updated 9 years ago
- Final Year Malware Detection Project with PPT, Research Paper, code and Synopsis. Malware detection project by Machine Learning ALgorithm…☆158Updated 2 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Updated 3 years ago
- ☆11Updated 3 years ago
- Hacking and Learning consistently for 100 days straight af.☆18Updated 3 years ago
- A Project where I try to learn something new every day, and this is a place to track it☆17Updated 4 years ago
- Web based facial Authentication system with flask server☆115Updated 3 years ago
- Project for Information assurance and security☆11Updated 4 years ago
- ☆39Updated last year
- A Repo to keep the CyberSecurity-IIITA projects☆16Updated 8 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆29Updated 3 years ago
- ☆17Updated 8 years ago
- ☆20Updated 3 years ago
- How to Get Started into Bug Bounty Complete Beginner Guide ( Part 1 Web Pentesting ) Hello guys, after a lot of requests and questions o…☆11Updated 4 years ago
- ☆17Updated 4 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Updated 5 years ago
- ☆71Updated 5 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Updated 4 years ago
- Automate bug bounty recon using bash alias☆15Updated last year
- Complite Web Application Penetration Testing☆26Updated 4 years ago
- repo for the ctf challenges☆14Updated last year