Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person or organization. Traditionally, phishing website detection is done through the usage of blacklist databases. However, due to the current, rapid development of global networking and communication technologies, th…
☆14May 1, 2020Updated 5 years ago
Alternatives and similar repositories for Phishing_Attack_Detection_With_NaturalLanguageProcessing
Users that are interested in Phishing_Attack_Detection_With_NaturalLanguageProcessing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆37Aug 24, 2022Updated 3 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Top 1 Millon ranked websites and top level domains (TLD)☆11Feb 4, 2026Updated 2 months ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- A python library for automated exploratory data analysis☆19Feb 2, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DEPHIDES: Deep Learning Based Phishing URL Detection System☆20Jul 30, 2024Updated last year
- Unified Audio-Visual Perception for Multi-Task Video Localization☆31Apr 19, 2024Updated last year
- We reached an accuracy of 75% in extracting vendors' names from transaction memos based on human-identified patterns☆23Apr 21, 2018Updated 7 years ago
- Command line tools for Qualcomm EFS file system☆12Jan 16, 2020Updated 6 years ago
- Deep learning spelling patterns with a recurrent neural network☆12Jun 5, 2017Updated 8 years ago
- ☆12Oct 25, 2023Updated 2 years ago
- Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing…☆69Mar 20, 2023Updated 3 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Updated this week
- RFC2821 Email Address parser (from Haraka)☆14Mar 3, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Training an LLM to use a calculator with multi-turn reinforcement learning, achieving a **62% absolute increase in evaluation accuracy**.☆70May 5, 2025Updated 11 months ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- Lightweight SMTP connection pool with clustering support, wait/release mechanism, connection lifecycle management, eager/lazy loading poo…☆12Sep 15, 2024Updated last year
- ☆16Oct 19, 2020Updated 5 years ago
- jhipster multi tenancy with schema selection (share db connections) on mariadb☆12Oct 25, 2017Updated 8 years ago
- Deep spelling/grammar checker☆14Jun 19, 2018Updated 7 years ago
- ☆13Sep 22, 2017Updated 8 years ago
- Experimental JHipster application with Angular Universal. Enables SSR on Jhipster Angular projects.☆13Oct 10, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Repository for 23'MM accepted paper "Curriculum-Listener: Consistency- and Complementarity-Aware Audio-Enhanced Temporal Sentence Groundi…☆52Dec 30, 2023Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆58Jun 29, 2023Updated 2 years ago
- ☆13Jan 6, 2023Updated 3 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- The Charity Public License☆17May 16, 2021Updated 4 years ago
- ☆19May 25, 2020Updated 5 years ago
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 3 years ago
- Print bytes as losslessly as possible.☆19Sep 6, 2025Updated 7 months ago
- REPL for C preprocessor of C++17☆10Jul 20, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Mar 18, 2022Updated 4 years ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- ☆10Jun 15, 2020Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- OLD Produces the UI bundle used by the Couchbase documentation site.☆11Aug 4, 2020Updated 5 years ago
- ☆18Dec 4, 2020Updated 5 years ago
- An example usage of the fusionauth-spring-security project☆13Jun 9, 2024Updated last year