rewanthtammana / Detect-phishing-websites-using-MLLinks
☆24Updated 5 years ago
Alternatives and similar repositories for Detect-phishing-websites-using-ML
Users that are interested in Detect-phishing-websites-using-ML are comparing it to the libraries listed below
Sorting:
- detecting phishing websites using machine learning☆45Updated 3 years ago
- Machine Learning for Phishing Website Detection☆56Updated 5 years ago
- Experiments to detect phishing websites using neural networks☆23Updated 6 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆48Updated 2 years ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13Updated 2 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Updated 6 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Updated 10 months ago
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆14Updated 2 years ago
- ☆33Updated 11 months ago
- ☆15Updated 7 years ago
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago
- ☆14Updated 5 years ago
- intrusion detection☆26Updated 8 years ago
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆32Updated this week
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 5 years ago
- ☆42Updated 3 years ago
- Detect leaks in security event logs.☆20Updated 6 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 6 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 months ago
- A simple powershell script which gives handy compliance report.☆18Updated 8 years ago
- Fraud prevention tool☆28Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Sites and URLs on software and securities that I hope to learn from you guys☆44Updated 5 years ago
- CTF problems for the practice of Beginners in Cyber Forensics.☆36Updated 2 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Automated Enumeration Script for Pentesting☆34Updated 5 years ago