Machine Learning basics with phishing dataset
☆10Apr 19, 2021Updated 4 years ago
Alternatives and similar repositories for MLWithPhishing
Users that are interested in MLWithPhishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- ☆16Jan 29, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- ☆16Apr 14, 2020Updated 5 years ago
- Phishing URL Dataset collected from IP2Loaction and PhishTank☆11Jul 23, 2022Updated 3 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Objective C dylibHijackScanner and analysis tool☆40Jul 12, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Goldphish phishing server with ngrok tunneling support.☆19Sep 7, 2018Updated 7 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- C# project to create or modify existing LNKs☆54Oct 18, 2022Updated 3 years ago
- Blockchain based certificate verification☆21Nov 3, 2019Updated 6 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Visa cvv tool for obtaining promotional visas and running the performance and will give you 20 with all its information.☆10Jun 25, 2021Updated 4 years ago
- ☆40May 21, 2022Updated 3 years ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing…☆68Mar 20, 2023Updated 3 years ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- ☆10Apr 29, 2023Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11Jan 14, 2021Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Shellcode runner in Rust☆34Oct 30, 2020Updated 5 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago