Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person or organization. Traditionally, phishing website detection is done through the usage of blacklist databases. However, due to the current, rapid development of global networking and communication technologies, th…
☆15May 1, 2020Updated 6 years ago
Alternatives and similar repositories for Phishing_Attack_Detection_With_NaturalLanguageProcessing
Users that are interested in Phishing_Attack_Detection_With_NaturalLanguageProcessing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- ☆16Feb 26, 2023Updated 3 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 4 years ago
- DEPHIDES: Deep Learning Based Phishing URL Detection System☆21Jul 30, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Web Classification and Reputation | IP Reputation | Real-Time Anti-Phishing | Streaming Malware Detection | File Reputation | Mobile Secu…☆26Jun 21, 2019Updated 6 years ago
- NeurIPS 2024 "NoisyGL: A Comprehensive Benchmark for Graph Neural Networks under Label Noise"☆32Jun 4, 2025Updated 11 months ago
- Command line tools for Qualcomm EFS file system☆12Jan 16, 2020Updated 6 years ago
- Code repository of “Multivariate Time-Series Anomaly Detection based on Enhancing Graph Attention Networks with Topological Analysis”☆32Dec 26, 2024Updated last year
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆43Apr 29, 2026Updated last week
- Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing…☆69Mar 20, 2023Updated 3 years ago
- RFC2821 Email Address parser (from Haraka)☆14Mar 3, 2026Updated 2 months ago
- Encrypted traffic classification use CNN☆34Dec 7, 2020Updated 5 years ago
- Training an LLM to use a calculator with multi-turn reinforcement learning, achieving a **62% absolute increase in evaluation accuracy**.☆71May 5, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- Lightweight SMTP connection pool with clustering support, wait/release mechanism, connection lifecycle management, eager/lazy loading poo…☆12Sep 15, 2024Updated last year
- ☆16Oct 19, 2020Updated 5 years ago
- Deep spelling/grammar checker☆14Jun 19, 2018Updated 7 years ago
- BSD-licensed open source Java library for consuming NVDB REST API☆14Sep 5, 2025Updated 8 months ago
- Experimental JHipster application with Angular Universal. Enables SSR on Jhipster Angular projects.☆13Oct 10, 2023Updated 2 years ago
- [CVPR 2025] Crab: A Unified Audio-Visual Scene Understanding Model with Explicit Cooperation☆85Dec 24, 2025Updated 4 months ago
- linux driver workaround for Huion Inspiroy G10T☆11Jan 7, 2019Updated 7 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆177Jan 12, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆58Jun 29, 2023Updated 2 years ago
- ☆11May 17, 2018Updated 7 years ago
- ☆13Jan 6, 2023Updated 3 years ago
- Regular expression for matching base64 encoded strings☆19Feb 2, 2022Updated 4 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- The Charity Public License☆17May 16, 2021Updated 4 years ago
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- ☆19May 25, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Jupyter client☆15Jul 12, 2025Updated 9 months ago
- ☆12Jan 9, 2023Updated 3 years ago
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 4 years ago
- Print bytes as losslessly as possible.☆19Sep 6, 2025Updated 8 months ago
- REPL for C preprocessor of C++17☆10Jul 20, 2025Updated 9 months ago
- ☆12Mar 18, 2022Updated 4 years ago
- ☆10Jun 15, 2020Updated 5 years ago