This project will determine which of the five supervised classification machine learning algorithms performs best in detecting phishy emails
☆47Oct 30, 2023Updated 2 years ago
Alternatives and similar repositories for MachineLearningPhishing
Users that are interested in MachineLearningPhishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Experimentation with Sentiment Analysis on Phishing Email Datasets. Machine-learning techniques to help classify the overall emotional co…☆16Nov 25, 2020Updated 5 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- Phishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing…☆69Mar 20, 2023Updated 3 years ago
- Detect email phishing with Watson Natural Language Classifier☆38Jan 7, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Email data visualization☆13Feb 23, 2023Updated 3 years ago
- Programs with word vectors, RNN, NLP stuff, etc☆18Feb 28, 2017Updated 9 years ago
- Machine Learning basics with phishing dataset☆11Apr 19, 2021Updated 4 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- AI(Artificial Intelligence) can be used to generate Lyrics of songs!☆11May 21, 2018Updated 7 years ago
- Sometimes it can be complicated to read certain sensors to see what is going on. This tutorial makes that simple, with only open-source t…☆11Apr 1, 2021Updated 5 years ago
- ☆19Jul 11, 2022Updated 3 years ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- 🧠 The CLI tool for learning commands from your terminal☆19Feb 27, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Math-aware QA system☆18Dec 17, 2022Updated 3 years ago
- Predict, Manage and Monitor the call drops of cell towers using Cloud Pak for Data☆10Mar 16, 2021Updated 5 years ago
- 👈 lightning-fast cd and command execution☆11Apr 2, 2026Updated last week
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 5 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A native iOS and macOS application for monitoring and managing Frigate home surveillance events.☆24Mar 28, 2026Updated 2 weeks ago
- PIP Manager written in python Tkinter☆13Jul 19, 2024Updated last year
- Code implementing game-theory based voting system by Emily Shen and Ron Rivest☆11Jan 24, 2014Updated 12 years ago
- Example Bank, now with CI/CD.☆11Sep 17, 2025Updated 6 months ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago
- The Enron-Spam dataset preprocessed in a single, clean csv file.☆62Nov 7, 2021Updated 4 years ago
- WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, …☆18Jun 29, 2023Updated 2 years ago
- Docker image of Rsyslog with Pimpmylog GUI based on debian:stable-slim (latest)☆16Oct 30, 2020Updated 5 years ago
- Manage your Challonge and Smash.gg tournaments with ease...Hopefully I actually finish this project this time ...☆10Jan 11, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python / Github CLI - Github dependabot alert scraper - Software Composition Analysis (SCA), Vulnerability Management, Patching, Supply C…☆10Feb 10, 2023Updated 3 years ago
- Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed☆15Oct 8, 2019Updated 6 years ago
- Scan directories, exports, and backups for sensitive data (like PII and API keys) with Nightfall's data loss prevention (DLP) APIs. Disco…☆11Mar 17, 2022Updated 4 years ago
- A Python library for efficient and flexible cycle-consistency training of transformer models via iteratie back-translation. Memory and co…☆11Jan 13, 2025Updated last year
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- A basketball tourney application.☆12Sep 3, 2025Updated 7 months ago
- Experiments to detect phishing websites using neural networks☆23Nov 24, 2019Updated 6 years ago