IBM / nlc-email-phishing
Detect email phishing with Watson Natural Language Classifier
☆35Updated 3 years ago
Alternatives and similar repositories for nlc-email-phishing:
Users that are interested in nlc-email-phishing are comparing it to the libraries listed below
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- ☆15Updated 8 years ago
- A tool for detecting sensitive data in code repositories☆14Updated this week
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆39Updated 7 years ago
- Jupyter Notebooks for learning network-based buffer overflows, network utilities, and scapy library☆22Updated last month
- Explore AI Supply Chain Risk with the AI Risk Database☆53Updated 10 months ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Content for cyber defense course☆14Updated 10 years ago
- This repo contains workshop material delivered at #nullcon2020☆15Updated 5 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 2 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Updated 4 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆12Updated 2 years ago
- code reviews to practice☆16Updated 3 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- ☆27Updated 4 years ago
- Pentest ToolKit☆28Updated 5 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- ☆11Updated last year
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Updated last year
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 10 months ago
- Deep and Dark Web OSINT Tool☆9Updated 6 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 7 years ago
- Vulnerable Task Manager☆15Updated 2 months ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- playing around with food and drink sites and OSINT☆15Updated 6 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago