This research project throws light on important features to look for while detecting phishing mail and also presents a comparative analysis of various algorithms to identify phishing mail by using mail features and URL features.
☆11Jul 17, 2021Updated 4 years ago
Alternatives and similar repositories for Identify-Phishing-Mail
Users that are interested in Identify-Phishing-Mail are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The ultimate AI detection bypass tool.☆13Jan 22, 2024Updated 2 years ago
- ☆11Mar 12, 2022Updated 4 years ago
- With WWW being the global platform, various fields inclusive to the same have emerged until hitherto. Due to ever-changing forms of cyber…☆15Jun 9, 2021Updated 4 years ago
- This project is aimed at developing technology for detecting Dyslexia using just the camera module present in a laptop.☆14Jul 7, 2021Updated 4 years ago
- A security research tool to send targeted spam messages on either Facebook or Twitter. The program analyzes the feed of its target to inc…☆10Apr 16, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Training from scratch a character embedding following Word2Vec, using tensorflow.☆14Mar 24, 2023Updated 3 years ago
- Final year project☆11Jun 3, 2020Updated 5 years ago
- Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processi…☆16Feb 20, 2022Updated 4 years ago
- AI: Deep Learning for Phishing URL Detection☆57Dec 8, 2022Updated 3 years ago
- University of Sheffield Research Software Engineering team's website☆16Apr 10, 2026Updated last week
- Discord App Built with MERN Stack.🎮Chat Functionality, Users can send friend Invitations, start stream.📹☆17Jun 26, 2023Updated 2 years ago
- Open source project for creating a website for a Hypothetical Dream University(HDU) for beginners.☆14Oct 24, 2023Updated 2 years ago
- ☆14May 25, 2022Updated 3 years ago
- Source code for AICTE's work done by Team Extrapolate (winner@SIH'17) during 2017-2018☆11Nov 28, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆19Aug 19, 2020Updated 5 years ago
- This project aims at training/educating employees about real-life phishing attack scenarios by carrying out simulated spear-phishing atta…☆11May 6, 2021Updated 4 years ago
- Phishing email detection using NLP and AI☆11Jun 14, 2023Updated 2 years ago
- ☆16Sep 9, 2022Updated 3 years ago
- Decentralized Application for Agriculture Supply Chain Management☆19Mar 7, 2018Updated 8 years ago
- ☆17Sep 3, 2021Updated 4 years ago
- Sends email alerts to the public for GOV.UK☆18Updated this week
- Mobile app part of the project to warn farmers about lightning strikes☆10Oct 7, 2020Updated 5 years ago
- Hyperledger Fabric Network for file sharing using Multi-Authority Attribute Based Encryption as the encryption scheme and IPFS as the d…☆12May 6, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Using Machine learning classifier developed GUI which takes the url of suspicious websites as input and tells the user if it is a benign …☆22Apr 11, 2021Updated 5 years ago
- User Authentication REST API built using Node & Express. The REST API include Login, Register, Reset Password, storing Email Subscribers,…☆17Mar 16, 2021Updated 5 years ago
- elliot_on_g0d☆19Jan 24, 2023Updated 3 years ago
- This project ensures that the every detail uploaded by the user on their CVs or resumes is authenticated and stored on IPFS and the trans…☆11Dec 10, 2022Updated 3 years ago
- Command-line tool that helps cybersecurity researchers discover, analyze, and document vulnerabilities from the National Vulnerability Da…☆15Mar 31, 2025Updated last year
- There are many optimization algorithms described in the book "Optimization of Engineering Design: Algorithms and Examples" by Prof. Kalya…☆17Dec 1, 2024Updated last year
- Real estate website/web-app using laravel 7.0☆25Jan 6, 2023Updated 3 years ago
- Pedagogy is a feedback-driven performance management app for education professionals built with Flask, Altair (Altair-viz) and pandas☆23Apr 7, 2023Updated 3 years ago
- The project consists of developing a solution around the problem of Disaster Management. It involves complete assurance that the resource…☆21Nov 27, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- End to End Machine Learning Projects☆17Oct 17, 2023Updated 2 years ago
- ☕️ A DApp supply chain solution to prove the authenticity of coffee by leveraging the transparency, traceability and efficiency of the Et…☆17Jan 24, 2023Updated 3 years ago
- This repository contains the Python code developed to run the experiments of my thesis titled "Phishing Detection in Email".☆12Nov 8, 2024Updated last year
- This repository contain all files for EDA☆27Jun 19, 2022Updated 3 years ago
- Using Machine Learning to detect Dyslexia.☆21Oct 1, 2020Updated 5 years ago
- This is the LinkedIn Learning repository for Hands On SQL.☆41Dec 12, 2023Updated 2 years ago
- Data Visualization with Python, Data Mining with Weka, LLMs, Machine Learning, NLP, Python, R Explanatory Data Analysis.☆19Aug 16, 2025Updated 8 months ago