Detect email phishing with Watson Natural Language Classifier
☆38Jan 7, 2022Updated 4 years ago
Alternatives and similar repositories for nlc-email-phishing
Users that are interested in nlc-email-phishing are comparing it to the libraries listed below
Sorting:
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- Extension for VS Code editor to enable IBM Cloud CLI capabilities from within the editing environment.☆13Nov 18, 2025Updated 3 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Microsoft give away books downloader in Linux or Windows☆13Feb 3, 2022Updated 4 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- 僕の自学の方法。Mi camino de aprendizaje autodidáctico. My programming self-study road.☆12Aug 13, 2025Updated 6 months ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- ☆14Jan 26, 2026Updated last month
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- MLinProduction SageMaker workshop hosted in April 2020☆15Apr 19, 2020Updated 5 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- This project is part of the 'IBM Cloud Native Reference Architecture for Kubernetes' suite☆18Apr 21, 2020Updated 5 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 5 years ago
- ☆40Aug 26, 2021Updated 4 years ago
- ☆18Jun 2, 2022Updated 3 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 4 years ago
- OpenShift on IBM Cloud Workshops☆45May 27, 2020Updated 5 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Oct 14, 2022Updated 3 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Iteration Zero terraform scripts for IBM Cloud provisioned services and clusters☆22Jul 8, 2023Updated 2 years ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 6 years ago
- Machine Learning for Phishing Website Detection☆56Mar 1, 2020Updated 6 years ago
- php Non-AlphaNumeric Encoder☆20Apr 8, 2017Updated 8 years ago
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- ☆11Sep 14, 2022Updated 3 years ago
- The Github Actions - AWS CDK Lambda Monorepo Starter is a comprehensive template designed for efficiently building and deploying multiple…☆11Dec 22, 2023Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago