Machine Learning for Phishing Website Detection
☆56Mar 1, 2020Updated 6 years ago
Alternatives and similar repositories for phishytics-machine-learning-for-phishing
Users that are interested in phishytics-machine-learning-for-phishing are comparing it to the libraries listed below
Sorting:
- Experiments to detect phishing websites using neural networks☆23Nov 24, 2019Updated 6 years ago
- It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Pyt…☆189Apr 19, 2025Updated 10 months ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- ☆24Oct 1, 2020Updated 5 years ago
- detecting phishing websites using machine learning☆45Aug 11, 2022Updated 3 years ago
- E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android☆17Sep 18, 2023Updated 2 years ago
- Chrome extension for detecting phishing web sites☆255Oct 2, 2020Updated 5 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- Analysis Correlation Engine☆23Feb 8, 2022Updated 4 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 2 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 6 months ago
- SSL man-in-the-middle tool targeting iOS devices < 4.3.5☆37Aug 24, 2011Updated 14 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- YouTube for Android Auto without ROOT (rootless)☆19Mar 25, 2021Updated 4 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Sep 6, 2019Updated 6 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆41Mar 5, 2019Updated 7 years ago
- ☆33Jan 3, 2023Updated 3 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆23Jan 3, 2026Updated 2 months ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- Financial Modelling and Computation☆11Nov 19, 2017Updated 8 years ago
- ☆12Jun 9, 2021Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- This repo contains scripts, frameworks, and other tools related to DDoS.☆36Aug 24, 2019Updated 6 years ago
- ☆382Aug 27, 2021Updated 4 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆41Apr 10, 2016Updated 9 years ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆128Updated this week
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago