A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
☆48Apr 15, 2023Updated 2 years ago
Alternatives and similar repositories for Malicious-Urlv5
Users that are interested in Malicious-Urlv5 are comparing it to the libraries listed below
Sorting:
- Detecting malicious URLs using an autoencoder neural network☆42Oct 9, 2022Updated 3 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆36Feb 26, 2018Updated 8 years ago
- Applying text model to Detection Task☆74May 9, 2017Updated 8 years ago
- AI: Deep Learning for Phishing URL Detection☆55Dec 8, 2022Updated 3 years ago
- 基于url特征的轻量级的恶意页面检测☆21Jul 3, 2017Updated 8 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- In todays era, due to the surge in the usage of internet and other online platforms, security has been a major concern. Many cyber attack…☆11Apr 11, 2021Updated 4 years ago
- ☆12May 10, 2023Updated 2 years ago
- Malicious Web Sites Detection using Suspicious URL☆76Oct 2, 2020Updated 5 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆53Feb 19, 2023Updated 3 years ago
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆19Aug 19, 2020Updated 5 years ago
- All published CVE and their recent changes, ready to be used by humans and machines☆19Nov 20, 2024Updated last year
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Convolutional neural network for categorising prostate cancer from MRI images.☆11Jul 22, 2020Updated 5 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆134Jun 13, 2021Updated 4 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- Software Vulnerabilities to Weakness Mapping☆23Feb 24, 2022Updated 4 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- Minified version of Project Sherlock written in GO. Lookup given username from 1000 social networks☆31Oct 19, 2023Updated 2 years ago
- Chrome extension for detecting phishing web sites☆255Oct 2, 2020Updated 5 years ago
- A web application which detects fake news using machine learning and natural language processing techniques.☆30May 6, 2021Updated 4 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- The most up-to-date list of Turkish ads to block ads on Turkish websites☆21Feb 26, 2026Updated last week
- With WWW being the global platform, various fields inclusive to the same have emerged until hitherto. Due to ever-changing forms of cyber…☆14Jun 9, 2021Updated 4 years ago
- 基于Python机器学习的乳腺癌预测模型☆10Dec 11, 2018Updated 7 years ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 2 months ago
- Detecting malicious URLs using Machine Learning☆29Oct 30, 2018Updated 7 years ago
- A Flutter application with the GetX framework, Node.js backend, Typescript, and MongoDB database for sharing notes between teachers and s…☆11Apr 10, 2025Updated 11 months ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- This sample Flask code shows how to create a RESTful API for subordinate resource☆12Feb 3, 2026Updated last month
- Learn LangChain for Genearative AI with OpenAI API using Python☆11Feb 15, 2024Updated 2 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Anatomy and Visualization of the Network structure of the Dark web using multi-threaded crawler☆43Jul 27, 2024Updated last year
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago