Model Detect Phishing Website by using Machine Learning for Project Chongluadao
☆18Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for Phishing-detection-ML
Users that are interested in Phishing-detection-ML are comparing it to the libraries listed below
Sorting:
- Blind SQL Injection (BSQLI) Data Exploration Tool☆18Feb 18, 2017Updated 9 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- golang microservice boilerplate setup.☆13May 25, 2025Updated 9 months ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- ☆13Jul 13, 2020Updated 5 years ago
- ☆10Aug 9, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- From Dork to Download: Automating Google Dorks with Playwright☆41Mar 1, 2026Updated last week
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 4 years ago
- Domain Blocklist☆10Aug 21, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- URL Feature extraction and Engineering aided with Classification via Neural Networks☆11Dec 11, 2021Updated 4 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- ☆11Nov 6, 2023Updated 2 years ago
- Fetches security vulnerabilities and creates pip-constraints based on them.☆12Jan 27, 2025Updated last year
- Telegram MIniApp example☆14Jan 10, 2025Updated last year
- An E-Commerce REST-API Written in Golang with Clean-Architecture (Gin framework)☆10Mar 27, 2024Updated last year
- A simple tool for retrieving a request's IP address on the server.☆16Oct 26, 2022Updated 3 years ago
- Native cityhash Go implementation☆12Jan 19, 2024Updated 2 years ago
- A ruby gem for creating secure passphrases using EFF's long wordlist.☆11Apr 20, 2018Updated 7 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Template query library for Rust SQLx☆15Feb 16, 2026Updated 3 weeks ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago