☆30Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for VisualPhishNet
Users that are interested in VisualPhishNet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pollute phishing kits with fake credentials☆12Dec 17, 2021Updated 4 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Using mainly CSS animations and a scattering of JavaScript, make any page a winter wonderland of snow (originally built in January 2010)☆11Apr 7, 2016Updated 10 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- Phishing Website detection with Machine Learning. This include flask server, chrome extension and machine learning for phishing website d…☆13Sep 27, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This project is our submission for the Kavach Hackathon 2023, in which we have created a browser extension that detects the links present…☆13Apr 13, 2023Updated 3 years ago
- Imitation Adversarial Attacks for Black-box Neural Ranking Models☆12Feb 5, 2024Updated 2 years ago
- Simple RISC-V RV32I CPU in VHDL for use in FPGA Designs☆18Sep 2, 2019Updated 6 years ago
- Major Project for Final Year Engineering☆14Aug 10, 2022Updated 3 years ago
- Candlestick Trading, Analysis & Strategy☆19Sep 7, 2021Updated 4 years ago
- Website Comparison Tool☆11May 21, 2021Updated 4 years ago
- This project consists of advanced phishing detection using the BERT masked language model.☆29Jan 31, 2024Updated 2 years ago
- RankGAN: A Maximum Margin Ranking GAN for Generating Faces☆14May 9, 2019Updated 6 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Official tensorflow implementation of "DHSGAN: An End to End Dehazing Network for Fog and Smoke"☆21Dec 23, 2023Updated 2 years ago
- Code, data, and models for the EMNLP 2020 paper "Learning to Fuse Sentences with Transformers for Summarization"☆16Nov 2, 2022Updated 3 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Unleash the full potential of exascale LLMs on consumer-class GPUs, proven by extensive benchmarks, with no long-term adjustments and min…☆26Nov 11, 2024Updated last year
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21☆348Jul 26, 2025Updated 9 months ago
- A pratice of OCR model for reading Captchas☆23Jul 11, 2024Updated last year
- Turn a panel app into a desktop app☆15May 13, 2022Updated 3 years ago
- 🔍 Code Search Tools & Experiments☆12Mar 1, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- ☆19Mar 31, 2019Updated 7 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- SPVec: A Word2vec-inspired feature representation method for Drug-Target Interaction Prediction☆20Jan 8, 2020Updated 6 years ago
- ☆13Dec 2, 2021Updated 4 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Feb 12, 2026Updated 2 months ago
- Chatting with a single gmail draft via the Gmail API☆13Mar 10, 2020Updated 6 years ago
- An image search engine made using python GUI, that extracts and stores features from images in database in the form of color correlogram …☆20Nov 19, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆10Jan 29, 2024Updated 2 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Pytorch implementation of Get To The Point: Summarization with Pointer-Generator Networks (2017) by Abigail See et al.☆15May 16, 2020Updated 5 years ago
- Welcome to the RAG University repository! This repository contains code implementations for Retrieval-Augmented Generation (RAG) models, …☆23Dec 18, 2023Updated 2 years ago
- code2vec for Python 3 made for NL2ML project☆18Mar 25, 2023Updated 3 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 10 months ago
- A ground-up rebuild of the stock gridfinity bins in OpenSCAD☆14Aug 29, 2022Updated 3 years ago