IBM / nlc-email-phishingLinks
Detect email phishing with Watson Natural Language Classifier
☆37Updated 3 years ago
Alternatives and similar repositories for nlc-email-phishing
Users that are interested in nlc-email-phishing are comparing it to the libraries listed below
Sorting:
- Machine Learning for Phishing Website Detection☆56Updated 5 years ago
- detecting phishing websites using machine learning☆45Updated 3 years ago
- An fully configurable linkedin scrape : scrape anything within linkedin☆69Updated 5 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 6 years ago
- ☆16Updated 8 years ago
- Machine Learning For Cybersecurity.☆68Updated 6 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆12Updated 3 years ago
- Detect-X Automated Threat Detection by AI☆32Updated 6 years ago
- ☆42Updated 2 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Updated 5 years ago
- Experiments to detect phishing websites using neural networks☆23Updated 5 years ago
- Hands-On AWS Penetration Testing with Kali Linux published by Packt☆134Updated 2 years ago
- ☆12Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 8 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 2 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆127Updated this week
- Curated list of awesome, open source data exfiltration tools☆63Updated 4 years ago
- ☆14Updated 4 years ago
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago
- Pull secrets from an AWS environment☆68Updated 5 years ago
- This will serve as links to write-ups about solving the challenges on ROOTCON's CTF through the years☆30Updated last year
- Machine Learning applied to Cyber Security Course☆46Updated 6 years ago
- Hands-On Penetration Testing with Python, published by Packt☆83Updated last year
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Updated 5 years ago
- Training scenarios for cyber ranges☆12Updated 5 years ago
- FARO - Document Sensitivity Detector☆11Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28Updated last year