rewanthtammana / Detect-phishing-websites-using-MLLinks
☆24Updated 5 years ago
Alternatives and similar repositories for Detect-phishing-websites-using-ML
Users that are interested in Detect-phishing-websites-using-ML are comparing it to the libraries listed below
Sorting:
- detecting phishing websites using machine learning☆45Updated 3 years ago
- Machine Learning for Phishing Website Detection☆57Updated 5 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- Experiments to detect phishing websites using neural networks☆23Updated 6 years ago
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆14Updated 2 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 6 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13Updated 2 years ago
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆47Updated 10 months ago
- Swachalit - The null automation platform that hosts null.co.in.☆21Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- Pentest ToolKit☆28Updated 5 years ago
- ☆19Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 5 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 6 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 7 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 5 months ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated last week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Updated 5 years ago
- pentestscripts☆16Updated 6 years ago
- CTF problems for the practice of Beginners in Cyber Forensics.☆38Updated 2 years ago
- Detect leaks in security event logs.☆20Updated 6 years ago