Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishing URLs, which are targeted to the Brazilian population.
☆60Jun 1, 2021Updated 4 years ago
Alternatives and similar repositories for url-feature-extractor
Users that are interested in url-feature-extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A machine learning approach to detect phishing urls☆31Jul 13, 2022Updated 3 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆55Feb 19, 2023Updated 3 years ago
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆37Feb 26, 2018Updated 8 years ago
- Malicious Web Sites Detection using Suspicious URL☆76Oct 2, 2020Updated 5 years ago
- Using Machine learning classifier developed GUI which takes the url of suspicious websites as input and tells the user if it is a benign …☆22Apr 11, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AI: Deep Learning for Phishing URL Detection☆57Dec 8, 2022Updated 3 years ago
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆21Aug 19, 2020Updated 5 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆12May 10, 2023Updated 2 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆177Jan 12, 2021Updated 5 years ago
- Collection of cyber security and "AI" relevant topics☆73Jan 1, 2018Updated 8 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- Packet Construction Set☆10Nov 20, 2017Updated 8 years ago
- Detecting malicious URLs using Machine Learning☆29Oct 30, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- detect malicious URL and Request (Bi-LSTM、Bi-LSTM + CNN、CNN + Bi-LSTM、CNN + Bi-LSTM + CNN)☆59Mar 18, 2019Updated 7 years ago
- A tutorial on how to setup a JWT auth app using React and Flask and then deploy it using NGINX and Gunicorn.☆16Oct 14, 2020Updated 5 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆15May 1, 2020Updated 5 years ago
- JSON API for ExploitDB Website☆17Jan 11, 2015Updated 11 years ago
- Sharable Grakn knowledge graphs☆14Dec 28, 2022Updated 3 years ago
- Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the mome…☆14Aug 25, 2020Updated 5 years ago
- Aim: To build web apps powered by Sockets.☆11Jun 3, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BigQuery Data Connector for Dremio☆12Sep 29, 2023Updated 2 years ago
- Export contacts and chat messages from iOS or macOS for easy viewing and searching☆14Jan 30, 2022Updated 4 years ago
- secret_sender is a program that manipulates the IP packet to send a message accepted from command line through one of the protocols (TCMP…☆13Jun 3, 2017Updated 8 years ago
- Flask app for monitoring OEE☆11Sep 25, 2023Updated 2 years ago
- Phone number osint☆10Mar 2, 2023Updated 3 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆20Feb 2, 2023Updated 3 years ago
- 第三届阿里云安全算法挑战赛☆37Jul 6, 2023Updated 2 years ago
- A pratice of OCR model for reading Captchas☆23Jul 11, 2024Updated last year
- Multi-Master Replication Experiment On Odoo Using Bucardo☆10Aug 1, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆12Jan 6, 2024Updated 2 years ago
- SHApe simulation with graph KERnels☆11May 17, 2021Updated 4 years ago
- ⚡ A very straightfoward guide to authenticate users in NextJS with NFTs. Block users that aren't holding a specific ERC721 NFT☆12Apr 30, 2023Updated 2 years ago
- DEPRECATED, see commotion-client - MeshBook is an open-source OSX utility app that uses OLSR (a routing protocol for mobile ad-hoc networ…☆34Nov 20, 2013Updated 12 years ago
- Argon2 key derivation for Ruby☆11Apr 4, 2026Updated 3 weeks ago
- ☆24Oct 1, 2020Updated 5 years ago
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆20Sep 11, 2025Updated 7 months ago