PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers
☆37Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for URLTran
Users that are interested in URLTran are comparing it to the libraries listed below
Sorting:
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆14May 1, 2020Updated 5 years ago
- Implementations of 3 phishing detection and identification baselines☆20Nov 25, 2024Updated last year
- ☆12Aug 4, 2018Updated 7 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Jan 14, 2022Updated 4 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Updated this week
- Text classification experiments using TextCNNs and Bi-attentive Classification Networks☆10Feb 18, 2019Updated 7 years ago
- ☆10Jan 22, 2025Updated last year
- ☆14Feb 12, 2024Updated 2 years ago
- Yara sort☆13Updated this week
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models☆14Jan 3, 2025Updated last year
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆173Jan 12, 2021Updated 5 years ago
- Splunking Crime using Splunk Machine Learning Toolkit☆11Dec 14, 2018Updated 7 years ago
- Top 1 Millon ranked websites and top level domains (TLD)☆11Feb 4, 2026Updated 3 weeks ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- A HTTPS/SOCKS4/SOCKS5 tunnel for Twisted.☆27Jul 1, 2014Updated 11 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆19Feb 19, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/llvm-qemu☆11Apr 29, 2015Updated 10 years ago
- Phishing detection using GNNs (SECRYPT'22)☆15Jun 6, 2025Updated 8 months ago
- A nodecg social media displayer☆10Mar 9, 2016Updated 9 years ago
- Docker container to send traffic for dev/troubleshooting to another container in docker using TCPREPLAY☆15Mar 24, 2016Updated 9 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- A cloud based remote android managment suite(Botnet), powered by NodeJS☆11Apr 27, 2021Updated 4 years ago
- tenjint is a Python 3-based platform for virtual machine introspection (VMI) on x86 and ARM. This is main Python 3 tenjint library.☆11Feb 9, 2021Updated 5 years ago
- ARM/THUMB disassembler☆15Aug 9, 2010Updated 15 years ago
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 3 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Automated phishing catcher☆12Nov 27, 2025Updated 3 months ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- The undocumented API for reporting sites to Safe Browsing☆11Jun 3, 2020Updated 5 years ago
- ☆132Jun 17, 2020Updated 5 years ago
- A simple C library for entropy measurement of byte streams and other data.☆14Dec 9, 2019Updated 6 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 2 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- ☆17Nov 22, 2021Updated 4 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Nov 25, 2023Updated 2 years ago
- ☆12Apr 11, 2017Updated 8 years ago