Implementations of 3 phishing detection and identification baselines
☆21Nov 25, 2024Updated last year
Alternatives and similar repositories for PhishingBaseline
Users that are interested in PhishingBaseline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆20Sep 11, 2025Updated 7 months ago
- PhishIntention: Phishing detection through webpage intention☆258Jan 5, 2026Updated 4 months ago
- ☆30Feb 9, 2022Updated 4 years ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- CVPR 2021 NTIRE workshop project repository of team VIP_UNIST☆13Oct 25, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- ☆21Jun 17, 2022Updated 3 years ago
- Phishing Website detection with Machine Learning. This include flask server, chrome extension and machine learning for phishing website d…☆13Sep 27, 2021Updated 4 years ago
- This project is our submission for the Kavach Hackathon 2023, in which we have created a browser extension that detects the links present…☆13Apr 13, 2023Updated 3 years ago
- AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. I…☆11Nov 21, 2023Updated 2 years ago
- Major Project for Final Year Engineering☆14Aug 10, 2022Updated 3 years ago
- Candlestick Trading, Analysis & Strategy☆19Sep 7, 2021Updated 4 years ago
- ☆12Oct 13, 2022Updated 3 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Crawl & visualize ICLR papers and reviews.☆18Nov 5, 2022Updated 3 years ago
- ☆85Jun 27, 2021Updated 4 years ago
- This Project is a Final Year Project on Detection of Phishing Website Using Machine Learning, Copyright (c) 2021 Goodness Adediran All r…☆77May 22, 2025Updated 11 months ago
- ☆14Apr 6, 2025Updated last year
- LibriVoc is a new open-source, large-scale dataset for vocoder artifact detection. LibriVoc is derived from the LibriTTS speech corpus, w…☆16Nov 6, 2025Updated 6 months ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- ☆17Jul 6, 2023Updated 2 years ago
- AI: Deep Learning for Phishing URL Detection☆57Dec 8, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆17Mar 6, 2023Updated 3 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Feb 12, 2026Updated 2 months ago
- 基于启发式特征的钓鱼网站检测系统☆32Jul 3, 2017Updated 8 years ago
- An Advanced PHP Captcha Generator☆28Feb 29, 2016Updated 10 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆10Jan 29, 2024Updated 2 years ago
- This is the codebase for defense framework described in USENIX '21 paper "WaveGuard: Understanding and Mitigating Audio Adversarial Examp…☆21Oct 20, 2021Updated 4 years ago
- A ground-up rebuild of the stock gridfinity bins in OpenSCAD☆14Aug 29, 2022Updated 3 years ago
- This is an industry-based project where we have to Predict careers based on the user profile.☆32Apr 27, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆221Jul 11, 2024Updated last year
- StalkPhish-OSS - The Phishing kits stalker, harvesting phishing kits for investigations.☆87Jun 28, 2025Updated 10 months ago
- Identifying Malicious Phishing URLs through Machine Learning☆58Aug 22, 2023Updated 2 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 7 months ago
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 3 years ago
- IEEE VCIP 2021: AnomalyHop: An SSL-based Image Anomaly Localization Method☆14Sep 18, 2021Updated 4 years ago