PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers
☆37Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for URLTran
Users that are interested in URLTran are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Implementations of 3 phishing detection and identification baselines☆21Nov 25, 2024Updated last year
- A machine learning approach to detect phishing urls☆31Jul 13, 2022Updated 3 years ago
- A PMTA-based sink application that does opens, clicks, bounces, OOBs and FBLs☆18Mar 30, 2026Updated last month
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆20Dec 29, 2023Updated 2 years ago
- Making it easier to manage DMARC reports☆21Jul 16, 2021Updated 4 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆37Jan 14, 2022Updated 4 years ago
- Top 1 Millon ranked websites and top level domains (TLD)☆11May 9, 2026Updated 2 weeks ago
- ☆16Jan 5, 2017Updated 9 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated 2 years ago
- Identifying Malicious Phishing URLs through Machine Learning☆59Aug 22, 2023Updated 2 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95May 11, 2026Updated last week
- ☆20Nov 7, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆19Nov 22, 2022Updated 3 years ago
- ☆142Jun 17, 2020Updated 5 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆177Jan 12, 2021Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- A centralized WebSocket Twitch Chat interface☆14Jan 12, 2023Updated 3 years ago
- AI: Deep Learning for Phishing URL Detection☆57Dec 8, 2022Updated 3 years ago
- This is the Network Flow Generator for ICSSIM☆18Aug 28, 2025Updated 8 months ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Feb 26, 2023Updated 3 years ago
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆15Nov 25, 2023Updated 2 years ago
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 4 years ago
- The undocumented API for reporting sites to Safe Browsing☆11Jun 3, 2020Updated 5 years ago
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A bundle for https://github.com/nodecg/nodecg showing the currently playing song.☆12Nov 26, 2015Updated 10 years ago
- Automated phishing catcher☆13Nov 27, 2025Updated 5 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- David Precious's custom SpamAssassin rules☆18Oct 13, 2022Updated 3 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- Deployment code for ashirt-server☆20May 14, 2026Updated last week