Detect email phishing with Watson Natural Language Classifier
☆38Jan 7, 2022Updated 4 years ago
Alternatives and similar repositories for nlc-email-phishing
Users that are interested in nlc-email-phishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Extension for VS Code editor to enable IBM Cloud CLI capabilities from within the editing environment.☆13Nov 18, 2025Updated 4 months ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Tutorial for Natural Language Processing☆21Sep 1, 2023Updated 2 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Machine Learning for Phishing Website Detection☆57Mar 1, 2020Updated 6 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- ☆14Jan 26, 2026Updated 2 months ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 6 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- php Non-AlphaNumeric Encoder☆21Apr 8, 2017Updated 8 years ago
- AI(Artificial Intelligence) can be used to generate Lyrics of songs!☆11May 21, 2018Updated 7 years ago
- Sometimes it can be complicated to read certain sensors to see what is going on. This tutorial makes that simple, with only open-source t…☆11Apr 1, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆16Jan 5, 2017Updated 9 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- Matplotlib Image labeller for classifying images☆11Jan 5, 2026Updated 2 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Math-aware QA system☆18Dec 17, 2022Updated 3 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated last month
- [IEEE TITS 2024] Activity-aware human mobility prediction with hierarchical graph attention recurrent network.☆25Jan 19, 2025Updated last year
- This is a list of useful information about urban mobility prediction. Related papers, datasets and codes are included.☆21Sep 18, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Guide-4.0-ROTELLE☆15Mar 18, 2021Updated 5 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- Code implementing game-theory based voting system by Emily Shen and Ron Rivest☆11Jan 24, 2014Updated 12 years ago
- Android app that mimics Google Translate using Firebase MLKit☆10Oct 15, 2019Updated 6 years ago
- Chrome extension for detecting phishing web sites☆253Oct 2, 2020Updated 5 years ago
- Bus Pirate NG firmware and hardware☆39Dec 28, 2022Updated 3 years ago