PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers
☆37Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for URLTran
Users that are interested in URLTran are comparing it to the libraries listed below
Sorting:
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆14May 1, 2020Updated 5 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- Making it easier to manage DMARC reports☆21Jul 16, 2021Updated 4 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆10Dec 29, 2021Updated 4 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- ☆14Dec 11, 2024Updated last year
- An ensemble of functions for use analysing the UKBB records on DNA Nexus☆15Mar 2, 2026Updated 2 weeks ago
- ☆17Nov 22, 2021Updated 4 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Mar 12, 2026Updated last week
- ☆21Nov 7, 2023Updated 2 years ago
- ☆136Jun 17, 2020Updated 5 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆175Jan 12, 2021Updated 5 years ago
- SocketLabs Email Delivery PHP Client Library☆10Dec 11, 2023Updated 2 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- A cloud based remote android managment suite(Botnet), powered by NodeJS☆11Apr 27, 2021Updated 4 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 6 months ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- ☆16Feb 26, 2023Updated 3 years ago
- Counterfactual Inference by Machine Learning and Attribution Models☆15Aug 24, 2023Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- The effect of metabolic traits on oral and oropharyngeal cancer risk: a Mendelian randomization analysis☆12Apr 19, 2023Updated 2 years ago
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 3 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Nov 25, 2023Updated 2 years ago
- ETL UK-Biobank☆16Nov 17, 2022Updated 3 years ago
- The undocumented API for reporting sites to Safe Browsing☆11Jun 3, 2020Updated 5 years ago
- Unraveling the metabolic underpinnings of frailty using multicohort observational and Mendelian randomization analyses☆13May 17, 2023Updated 2 years ago
- Experiments to detect phishing websites using neural networks☆23Nov 24, 2019Updated 6 years ago
- A bundle for https://github.com/nodecg/nodecg showing the currently playing song.☆12Nov 26, 2015Updated 10 years ago
- CBU5201 Deception Dataset☆20Dec 10, 2024Updated last year
- Automated phishing catcher☆12Nov 27, 2025Updated 3 months ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago