detecting phishing websites using machine learning
☆45Aug 11, 2022Updated 3 years ago
Alternatives and similar repositories for detecting-phishing-websites
Users that are interested in detecting-phishing-websites are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Oct 1, 2020Updated 5 years ago
- Machine Learning for Phishing Website Detection☆57Mar 1, 2020Updated 6 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆27Oct 2, 2020Updated 5 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- Final year project☆11Jun 3, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- In todays era, due to the surge in the usage of internet and other online platforms, security has been a major concern. Many cyber attack…☆11Apr 11, 2021Updated 5 years ago
- ☆396Aug 27, 2021Updated 4 years ago
- This is the project on ransomeware detection using machine learning.☆27Dec 29, 2016Updated 9 years ago
- ☆12May 10, 2023Updated 2 years ago
- A online selling website for second-hand things☆11Sep 5, 2019Updated 6 years ago
- ☆12Mar 30, 2026Updated 2 weeks ago
- Example Python and R code for Cloudera Machine Learning (CML) training☆14Dec 1, 2020Updated 5 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- This is a simple web application that allows a company to track the transaction that are done for a product before its is bought by the u…☆12May 1, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Heart Disease Prediction using SVM, KNN and MLP and comparison of results☆12Oct 5, 2019Updated 6 years ago
- This webapp created on Flask which can convert any word into QR Code☆10Jun 6, 2020Updated 5 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- [ICML2024] Adaptive Text Watermark for Large Language Models☆25Dec 11, 2024Updated last year
- Sample Android App☆18Feb 20, 2016Updated 10 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 7 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Android White Label Application for the Voting Information Project (No longer updated)☆17Jan 3, 2017Updated 9 years ago
- Datacon2023 邮件安全赛道 赛题1 新型钓鱼邮件的检测 示例数据集☆30Nov 16, 2023Updated 2 years ago
- This Repo Contains Deployment of Machine Learning Models on various cloud services like Azure, Heroku, AWS,GCP etc☆17Jan 11, 2024Updated 2 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated 2 months ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- Bank Marketing data classification☆12Oct 2, 2020Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Safe evaluation of untrusted code on containers☆12Sep 6, 2019Updated 6 years ago
- Speaker Diarization using GRU in PyTorch☆11Aug 29, 2020Updated 5 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 12 years ago
- Cymric - Portable secure random number generator☆21Mar 10, 2014Updated 12 years ago
- Email Phishing Attempts Detection from the text of email bodies using natural language processing and machine learning☆29Feb 11, 2019Updated 7 years ago