This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.
☆17Aug 29, 2025Updated 7 months ago
Alternatives and similar repositories for Email-phishing-detector
Users that are interested in Email-phishing-detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆24Sep 23, 2024Updated last year
- Arabic Sign Language Translation System helps to convert the gestures and signs indicating the alphabet into written Arabic text in real-…☆14Jun 14, 2024Updated last year
- Bat Script to collect system and network information from Windows machines without external agents. Ideal for vulnerability assessment an…☆11Jan 27, 2025Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆55Sep 10, 2024Updated last year
- A voice authentication system leveraging Deep4SNet for DeepFake detection and GMM UBM for speaker verification. It provides a robust solu…☆14Nov 27, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- ☆16Jan 21, 2025Updated last year
- This Python-based Phishing Detector scans emails and URLs for threats. It checks sender reputation, analyzes content for suspicious keywo…☆34Jun 19, 2025Updated 9 months ago
- Basic tool for Information Gathering 🚀☆23Mar 26, 2024Updated 2 years ago
- AI powered career path recommendation system☆23Dec 14, 2024Updated last year
- Kendi Dictionary yapımı yazdım.☆14Feb 16, 2023Updated 3 years ago
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆32Jul 6, 2024Updated last year
- this simple tool help you to detect Deauth_DoS Attack on your Machine☆25Jun 1, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Phishing Email Detection Using Machine Learning This repository contains a comprehensive project aimed at detecting phishing emails usi…☆30Jan 9, 2026Updated 2 months ago
- Source code of the paper: Exploring Multi-View Pixel Contrast for General and Robust Image Forgery Localization, IEEE TIFS 2025.☆26Aug 8, 2025Updated 7 months ago
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆52Jul 1, 2024Updated last year
- A neat, object-oriented, lightweight, elegant and fast programming language 👾☆51Aug 8, 2024Updated last year
- Flutter mobile application for audio recognition using Tensorflow Lite to integrate the classification model☆27Feb 22, 2021Updated 5 years ago
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- ☆10May 6, 2017Updated 8 years ago
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Educational repository with source code examples☆12Jun 3, 2025Updated 9 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆95Nov 2, 2023Updated 2 years ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆16Oct 18, 2024Updated last year
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- ☆98Aug 22, 2025Updated 7 months ago
- Code repository for WiFi Hacking: Wireless Penetration Testing for Beginners, published by Packt☆15Jan 30, 2023Updated 3 years ago
- CEHv12 Notes☆15Jun 11, 2023Updated 2 years ago
- ☆35Nov 14, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OSINT Framework☆19Mar 31, 2021Updated 4 years ago
- Bruteforce tool for break 4 digit pin locks on smartphones from Huawei (This tool has now been confirmed to work on Samsung smartphones t…☆27Jul 1, 2018Updated 7 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆257Mar 21, 2024Updated 2 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- Learn Website Hacking / Penetration Testing From Scratch, published by Packt☆22Jan 30, 2023Updated 3 years ago
- Sentry without the MBA, credential stuffing and brute-force attack tool with many features☆26Dec 22, 2017Updated 8 years ago
- An HTTP requests flooder made in Python☆21Aug 21, 2020Updated 5 years ago