Developed a model to detect Phished emails from legitimate ones using the Spam Assassin dataset. Extracted relevant features by processing the mails using the NLP toolkit. Built various ML models like Naïve Bayes, Random Forest, and Voting Ensemble with the best accuracy of ~72%, and deep learning model like Neural Network with an accuracy o…
☆16Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for Detecting-Phishing-Attack-using-ML-DL-Models
Users that are interested in Detecting-Phishing-Attack-using-ML-DL-Models are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- ASCII Smuggling Hidden Prompt Injection is a novel approach to hacking AI assistants using Unicode Tags. This project demostrate how to u…☆18Aug 7, 2024Updated last year
- Sandbox samples and monitor them with kunai☆30Mar 3, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ModemJS is a node.js module that helps you send SMS, via serialport, with a GSM Modem.☆14May 16, 2022Updated 3 years ago
- Deep Learning Toolkit for Splunk☆18Mar 27, 2024Updated 2 years ago
- Turn any blog into structured threat intelligence.☆55Updated this week
- Classifying emails into custom user labels☆26Updated this week
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Oct 23, 2023Updated 2 years ago
- A simple a Telegram bot for Hyperliquid☆25Jan 9, 2026Updated 3 months ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆32Apr 4, 2026Updated 2 weeks ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- Security Content for the PEAK Threat Hunting Framework☆47Feb 15, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- A collection of dashboards and knowledge objects for Github data☆35Jan 9, 2024Updated 2 years ago
- ThePhish: an automated phishing email analysis tool☆1,333Aug 1, 2024Updated last year
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆115Mar 19, 2025Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆106Feb 1, 2026Updated 2 months ago
- Malicious URLs identified by scanning various public URL sources using the Google Safe Browsing API (over 6 billion URLs scanned daily)☆69Apr 12, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A search command for Splunk which will allow you to search Elastic Search and display the results in the Splunk GUI☆70Aug 10, 2025Updated 8 months ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- ☆121May 26, 2025Updated 10 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆128Feb 21, 2025Updated last year
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆95Feb 19, 2026Updated 2 months ago
- Find CVE PoCs on GitHub☆161Aug 1, 2025Updated 8 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆143Feb 25, 2024Updated 2 years ago
- An opensource sigma conversion tool built using pysigma☆164Mar 24, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Splunk Software Development Kit for Java☆154Apr 25, 2024Updated last year
- Modern web-based distributed hashcracking solution, built on hashcat☆191Updated this week
- Tools for finding SMTP smuggling vulnerabilities.☆142Mar 26, 2024Updated 2 years ago
- simple YARA-based IOC scanner☆176Mar 17, 2026Updated last month
- Collection of Jupyter Notebooks by @fr0gger_☆195Dec 16, 2025Updated 4 months ago
- MISP Playbooks☆224Oct 14, 2025Updated 6 months ago
- hosts for pihole☆141Aug 28, 2024Updated last year