☆59Sep 17, 2023Updated 2 years ago
Alternatives and similar repositories for PHISHING-DETECTION-WITH-NLP
Users that are interested in PHISHING-DETECTION-WITH-NLP are comparing it to the libraries listed below
Sorting:
- Solutions for wipro prp☆12Nov 6, 2018Updated 7 years ago
- Profile user-defined regions of Python code☆12Mar 17, 2021Updated 4 years ago
- ☆12Feb 9, 2025Updated last year
- 🎇Vision: great List of Regex, Patterns, Google queries, public SPARQL, SQL, NoSQL - Regular Expressions(=Search Patterns=Data type defin…☆12Jul 9, 2025Updated 8 months ago
- Blockchain Attack Simulator (BCASim) is an Open Source Blockchain Simulator for Attack Analysis☆17Dec 21, 2025Updated 2 months ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Double-checked Gold Standard Data for Training and Testing OCR Engines☆18Jun 15, 2017Updated 8 years ago
- Fast multipattern regular expression searching for digital forensics☆18Jul 31, 2019Updated 6 years ago
- ☆16Jul 4, 2018Updated 7 years ago
- ☆17Mar 6, 2021Updated 5 years ago
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆25Apr 30, 2025Updated 10 months ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- 3D Data Processing Courses for Ditigal Twins. ITC UTWENTE☆27Dec 31, 2025Updated 2 months ago
- Extensions to authorization☆60Feb 19, 2026Updated 2 weeks ago
- ☆28Sep 9, 2024Updated last year
- Getting Target Browser information by using a URL☆35Dec 13, 2024Updated last year
- Collection of Multi-platform Scripts for Rubber Ducky that exploit the css webkit filter attack to crash Internet Explorer, Edge or Safar…☆36Sep 1, 2022Updated 3 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆35Dec 27, 2022Updated 3 years ago
- Open Source framework for anyone to work with Perplexity Sonar☆58Apr 6, 2025Updated 11 months ago
- This is a small autograd engine, made purely from numpy and python.☆27Sep 17, 2024Updated last year
- ☆37May 29, 2023Updated 2 years ago
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆40Aug 21, 2025Updated 6 months ago
- ☆45Apr 10, 2024Updated last year
- Adafruit WebSerial ESPTool fork for flashing ESP32Marauder to the Cheap-Yellow-Display and other variants☆47May 18, 2025Updated 9 months ago
- PyPupilEXT allows to detect the pupil diameter in images captured by stereo- and mono camera systems. The pupil diameter can be detected …☆48Oct 19, 2024Updated last year
- ☆83Aug 27, 2025Updated 6 months ago
- TCS, Infosys, Zoho, Freshworks, Wipro, CTS Placement Preparation Handbook 📚☆60Jan 3, 2021Updated 5 years ago
- ☆60Oct 9, 2023Updated 2 years ago
- Real time pupil detection in noisy images☆58Mar 25, 2023Updated 2 years ago
- A production ready Dockered MISP☆325Feb 26, 2026Updated last week
- Essential reads for every AI engineer interested in building AI apps.☆85Feb 29, 2024Updated 2 years ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆60Jul 7, 2024Updated last year
- ☆70Oct 30, 2023Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Jul 22, 2025Updated 7 months ago
- ☆96Apr 13, 2024Updated last year
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- Power Shell Scripts for the Hak5 Ducky☆95Oct 25, 2017Updated 8 years ago