detecting phishing websites using machine learning
☆45Aug 11, 2022Updated 3 years ago
Alternatives and similar repositories for detecting-phishing-websites
Users that are interested in detecting-phishing-websites are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Oct 1, 2020Updated 5 years ago
- Experiments to detect phishing websites using neural networks☆23Nov 24, 2019Updated 6 years ago
- Machine Learning for Phishing Website Detection☆57Mar 1, 2020Updated 6 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆27Oct 2, 2020Updated 5 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Final year project☆11Jun 3, 2020Updated 5 years ago
- In todays era, due to the surge in the usage of internet and other online platforms, security has been a major concern. Many cyber attack…☆11Apr 11, 2021Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- ☆398Aug 27, 2021Updated 4 years ago
- This is the project on ransomeware detection using machine learning.☆27Dec 29, 2016Updated 9 years ago
- ☆12May 10, 2023Updated 2 years ago
- A machine learning approach to detect phishing urls☆31Jul 13, 2022Updated 3 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 7 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- AI: Deep Learning for Phishing URL Detection☆57Dec 8, 2022Updated 3 years ago
- Android White Label Application for the Voting Information Project (No longer updated)☆17Jan 3, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated 2 months ago
- ☆13Feb 14, 2020Updated 6 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Apr 24, 2026Updated 2 weeks ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Ransomware Detection using Machine Learning Models and Ensemble Technique☆37Aug 8, 2024Updated last year
- Predict, Manage and Monitor the call drops of cell towers using Cloud Pak for Data☆10Mar 16, 2021Updated 5 years ago
- Install, configure and update container tools☆14Aug 20, 2023Updated 2 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago