rewanthtammana / Detect-phishing-websites-using-MLLinks
☆24Updated 4 years ago
Alternatives and similar repositories for Detect-phishing-websites-using-ML
Users that are interested in Detect-phishing-websites-using-ML are comparing it to the libraries listed below
Sorting:
- detecting phishing websites using machine learning☆45Updated 3 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- Experiments to detect phishing websites using neural networks☆22Updated 5 years ago
- Pentest ToolKit☆28Updated 5 years ago
- CTF problems for the practice of Beginners in Cyber Forensics.☆38Updated last year
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- Automated Enumeration Script for Pentesting☆34Updated 5 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Updated 7 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 6 years ago
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆47Updated 7 months ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 6 years ago
- Tool to predict attacker groups from the techniques and software used☆50Updated 4 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 5 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆15Updated 2 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 6 years ago
- A list of universities with vulnerability disclosure policies☆13Updated 5 years ago
- Some YARA rules i will add from time to time☆12Updated 6 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆33Updated 4 years ago