Implementations of 3 phishing detection and identification baselines
☆21Nov 25, 2024Updated last year
Alternatives and similar repositories for PhishingBaseline
Users that are interested in PhishingBaseline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PhishIntention: Phishing detection through webpage intention☆259Jan 5, 2026Updated 2 months ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- This repository collects papers related to Speech Tokenizer.☆17Oct 16, 2024Updated last year
- ☆11May 15, 2025Updated 10 months ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Experiments to detect phishing websites using neural networks☆23Nov 24, 2019Updated 6 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- Candlestick Trading, Analysis & Strategy☆19Sep 7, 2021Updated 4 years ago
- ☆12Nov 30, 2021Updated 4 years ago
- Matlab (and C) implementation of Dependency-LDA, Prior-LDA and Flat-LDA models for multi-label document classification☆17Aug 2, 2016Updated 9 years ago
- ☆83Jun 27, 2021Updated 4 years ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- This Project is a Final Year Project on Detection of Phishing Website Using Machine Learning, Copyright (c) 2021 Goodness Adediran All r…☆76May 22, 2025Updated 10 months ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- LibriVoc is a new open-source, large-scale dataset for vocoder artifact detection. LibriVoc is derived from the LibriTTS speech corpus, w…☆16Nov 6, 2025Updated 4 months ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- **ICASSP 2022** 《Toward Degradation-Robust Voice Conversion》Using speech enhancement and end-to-end denoising training to improve degrada…☆24Sep 27, 2022Updated 3 years ago
- AI: Deep Learning for Phishing URL Detection☆56Dec 8, 2022Updated 3 years ago
- Spoofing Speaker Verification Systems with Multi-speaker Text-to-speech Synthesis☆11Jun 21, 2022Updated 3 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- ☆391Aug 27, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- A ground-up rebuild of the stock gridfinity bins in OpenSCAD☆14Aug 29, 2022Updated 3 years ago
- A phishing kit collector for scavengers☆221Jan 22, 2026Updated 2 months ago
- My Ubuntu Ansible Playbooks Playground☆15Updated this week
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆219Jul 11, 2024Updated last year
- Identifying Malicious Phishing URLs through Machine Learning☆57Aug 22, 2023Updated 2 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- A template project to deploy airflow with argo CD☆12Jun 23, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- ☆14Oct 25, 2022Updated 3 years ago
- IEEE VCIP 2021: AnomalyHop: An SSL-based Image Anomaly Localization Method☆14Sep 18, 2021Updated 4 years ago
- Python asyncio-based library that implements the SPAMC/SPAMD client protocol used by SpamAssassin.☆17Updated this week
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- Source code for the "GRASP: Guiding model with RelAtional Semantics using Prompt"☆17Sep 7, 2023Updated 2 years ago