PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers
☆37Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for URLTran
Users that are interested in URLTran are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆14May 1, 2020Updated 5 years ago
- Implementations of 3 phishing detection and identification baselines☆21Nov 25, 2024Updated last year
- A machine learning approach to detect phishing urls☆30Jul 13, 2022Updated 3 years ago
- A PMTA-based sink application that does opens, clicks, bounces, OOBs and FBLs☆18Mar 30, 2026Updated last week
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Making it easier to manage DMARC reports☆21Jul 16, 2021Updated 4 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Apr 3, 2026Updated last week
- ☆21Nov 7, 2023Updated 2 years ago
- ☆137Jun 17, 2020Updated 5 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆176Jan 12, 2021Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- AI: Deep Learning for Phishing URL Detection☆56Dec 8, 2022Updated 3 years ago
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 7 months ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 3 years ago
- Haunter Asset Pack for Flipper Zero☆11May 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Experiments to detect phishing websites using neural networks☆23Nov 24, 2019Updated 6 years ago
- A bundle for https://github.com/nodecg/nodecg showing the currently playing song.☆12Nov 26, 2015Updated 10 years ago
- Automated phishing catcher☆12Nov 27, 2025Updated 4 months ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- CBU5201 Deception Dataset☆20Dec 10, 2024Updated last year
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Wall of Flippers is designed to find Flipper Zero devices using BLE (Bluetooth Low Energy)☆12Jan 16, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- A home for detection content developed by the delivr.to team☆72Aug 10, 2025Updated 8 months ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 6 months ago
- Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.☆23May 19, 2023Updated 2 years ago
- ☆22Apr 22, 2025Updated 11 months ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- A python library for automated exploratory data analysis☆19Feb 2, 2026Updated 2 months ago