faizann24 / phishytics-machine-learning-for-phishingLinks
Machine Learning for Phishing Website Detection
☆55Updated 5 years ago
Alternatives and similar repositories for phishytics-machine-learning-for-phishing
Users that are interested in phishytics-machine-learning-for-phishing are comparing it to the libraries listed below
Sorting:
- Experiments to detect phishing websites using neural networks☆21Updated 5 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- detecting phishing websites using machine learning☆44Updated 2 years ago
- Phishing website detection system provides strong security mechanism to detect and prevent phishing domains from reaching user. This proj…☆42Updated 5 years ago
- ☆24Updated 4 years ago
- A machine learning approach to detect phishing urls☆28Updated 2 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- My notes on various topics☆64Updated last year
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆25Updated 4 years ago
- Detecting malicious URLs using Machine Learning☆30Updated 6 years ago
- AI: Deep Learning for Phishing URL Detection☆52Updated 2 years ago
- Machine Learning applied to Cyber Security Course☆44Updated 5 years ago
- Malicious Web Sites Detection using Suspicious URL☆74Updated 4 years ago
- ☆27Updated 4 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆24Updated 7 years ago
- Chrome extension for detecting phishing web sites☆248Updated 4 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- A list of cybersecurity projects that use machine learning techniques☆64Updated 8 years ago
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- A collection of resources for security data☆41Updated 7 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- For storing of the volumes☆4Updated 5 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Updated 3 years ago
- ☆55Updated 6 years ago
- Uses deep learning and machine learning techniques to detect and classify web pages as spam, malware and phishing☆62Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago