End to End Malicious URL Detection Project using Machine learning and deep learning
☆28Apr 25, 2023Updated 3 years ago
Alternatives and similar repositories for End-to-End-Malicious-URL-Detection
Users that are interested in End-to-End-Malicious-URL-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- A travel agency app with a distributed database implemented from scratch!☆17Dec 8, 2022Updated 3 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- Files required for creating a college enquiry chatbot using RASA which is an open-source machine learning framework used for building aut…☆15Dec 16, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The repository is dedicated to Evasion Generative Adversarial Network source code.☆16Jun 9, 2022Updated 3 years ago
- Code for our submission to the WTMC 2021 workshop☆15Jul 14, 2021Updated 4 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- Spamming All forone Powerfull Termux Tools☆37Apr 8, 2026Updated 3 weeks ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 3 years ago
- Sample evtx files to use for testing hayabusa detection rules☆64Nov 5, 2025Updated 5 months ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Run TTPs, with AI!☆127Feb 23, 2026Updated 2 months ago
- Flow feature extraction tool built in Rust using eBPF☆26Apr 7, 2026Updated 3 weeks ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 11 months ago
- 🇻🇳 [VNCERT/CC] Digital Forensics Lab 🇻🇳☆23Dec 26, 2024Updated last year
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- File-Upload-XSS is a Python script that exploits the SVG XSS vulnerability in file upload services to gather information about users visi…☆18Jan 15, 2023Updated 3 years ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆18May 10, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Send Discord Webhook messages from command line using this simple DiscordSendWebhook.exe (Windows)☆14Nov 15, 2020Updated 5 years ago
- Yara Based Detection Engine for web browsers☆49Sep 5, 2021Updated 4 years ago
- A repository containing experimental and upcoming pipelines and features for Morpheus☆36Jul 22, 2025Updated 9 months ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- The Westermo network traffic dataset☆26Apr 18, 2023Updated 3 years ago
- https://academy.tcm-sec.com/☆15Aug 19, 2025Updated 8 months ago
- Investigation into replacing the MES compiler☆30Updated this week
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- A Windows Event Log MCP☆45Aug 25, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty…☆25Jan 13, 2024Updated 2 years ago
- GitHub Pages for Kernel Self Protection Project☆24Nov 8, 2025Updated 5 months ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- TensorFlow 2 implementation of Wasserstein Conditional GAN with Gradient Penalty (WCGAN-GP) for synthetic data generation☆21Jan 31, 2022Updated 4 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago