This project will determine which of the five supervised classification machine learning algorithms performs best in detecting phishy emails
☆48Oct 30, 2023Updated 2 years ago
Alternatives and similar repositories for MachineLearningPhishing
Users that are interested in MachineLearningPhishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Experimentation with Sentiment Analysis on Phishing Email Datasets. Machine-learning techniques to help classify the overall emotional co…☆15Nov 25, 2020Updated 5 years ago
- Final year project☆11Jun 3, 2020Updated 5 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Detect email phishing with Watson Natural Language Classifier☆38Jan 7, 2022Updated 4 years ago
- A production-grade deep learning system for automated skin lesion classification using the HAM10000 dataset. This system provides trainin…☆12Dec 24, 2025Updated 4 months ago
- Email data visualization☆13Feb 23, 2023Updated 3 years ago
- Programs with word vectors, RNN, NLP stuff, etc☆18Feb 28, 2017Updated 9 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 5 years ago
- Comparative Analysis of CNN, RNN and HAN for Text Classification with GloVe Data Model☆11May 4, 2019Updated 7 years ago
- Code release for our IEEE Symposium on Security and Privacy 2022 paper entitled "WtaGraph: Web Tracking and Advertising Detection using G…☆17Sep 19, 2021Updated 4 years ago
- Archival. JSONL dump of the exhentai metadata from the community crawl.☆14Oct 1, 2019Updated 6 years ago
- Sometimes it can be complicated to read certain sensors to see what is going on. This tutorial makes that simple, with only open-source t…☆11Apr 1, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Email Analysis Toolkit☆26Sep 21, 2021Updated 4 years ago
- Underwater Object Detection using PyTorch☆14Jul 10, 2020Updated 5 years ago
- Reproduce - Traffic_prediction - StemGNN(NeurIPS20)☆12Feb 5, 2022Updated 4 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Constructed a structured heterogeneous text corpus graph to transform text classification problem into a node classification problem. Cr…☆14Oct 15, 2019Updated 6 years ago
- Math-aware QA system☆18May 8, 2026Updated 2 weeks ago
- Predict, Manage and Monitor the call drops of cell towers using Cloud Pak for Data☆10Mar 16, 2021Updated 5 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A tool that helps you easily translate your killer android apps in a nice & clear interface, using popular translator engines like Micros…☆10Dec 1, 2016Updated 9 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- Example Bank, now with CI/CD.☆11Sep 17, 2025Updated 8 months ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆13Apr 1, 2019Updated 7 years ago
- Simplify mainframe application deployments using Ansible☆11Jun 18, 2021Updated 4 years ago
- The Enron-Spam dataset preprocessed in a single, clean csv file.☆62Nov 7, 2021Updated 4 years ago
- 使用kprobe获取sys_execve参数☆12Nov 22, 2018Updated 7 years ago
- WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, …☆18Jun 29, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Manage your Challonge and Smash.gg tournaments with ease...Hopefully I actually finish this project this time ...☆10Jan 11, 2023Updated 3 years ago
- Python / Github CLI - Github dependabot alert scraper - Software Composition Analysis (SCA), Vulnerability Management, Patching, Supply C…☆10Feb 10, 2023Updated 3 years ago
- Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processi…☆17Feb 20, 2022Updated 4 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- ☆14Jan 26, 2026Updated 3 months ago
- A Python library for efficient and flexible cycle-consistency training of transformer models via iteratie back-translation. Memory and co…☆11Jan 13, 2025Updated last year
- Collection of Slides From My Conference Talks☆21Nov 21, 2022Updated 3 years ago