☆54Jul 24, 2018Updated 7 years ago
Alternatives and similar repositories for Detecting-Malicious-URL-Machine-Learning
Users that are interested in Detecting-Malicious-URL-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆37Feb 26, 2018Updated 8 years ago
- Detecting malicious URLs using Machine Learning☆29Oct 30, 2018Updated 7 years ago
- Collection of cyber security and "AI" relevant topics☆73Jan 1, 2018Updated 8 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆55Feb 19, 2023Updated 3 years ago
- A Dataset for the task of Malicious URL Detection☆20Jan 18, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Detecting malicious URLs using an autoencoder neural network☆42Oct 9, 2022Updated 3 years ago
- Graph clustering and Node embeddings with word2vec☆14Mar 2, 2019Updated 7 years ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- Malicious Web Sites Detection using Suspicious URL☆76Oct 2, 2020Updated 5 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆177Jan 12, 2021Updated 5 years ago
- eXpose deep neural network, detects malicious URLs, file paths and registry keys with proper training☆47Feb 13, 2018Updated 8 years ago
- A tool that detects maliciousness of suspicious links, written in python with <3.☆15Dec 26, 2022Updated 3 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆18Mar 12, 2025Updated last year
- The official implementation of paper "Drop-Activation: Implicit Parameter Reduction and Harmonious Regularization".☆10May 30, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This research project throws light on important features to look for while detecting phishing mail and also presents a comparative analys…☆11Jul 17, 2021Updated 4 years ago
- 人工智能检测恶意URL☆29Aug 22, 2020Updated 5 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Tutorial Golang membuat REST API menggunakan gin, gorm dan database MySQL☆12Aug 1, 2022Updated 3 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆277Aug 12, 2022Updated 3 years ago
- Using Machine learning classifier developed GUI which takes the url of suspicious websites as input and tells the user if it is a benign …☆22Apr 11, 2021Updated 5 years ago
- Plant Disease Detection using convolutional neural network. Our model can easily predict the disease of plants like Potato , Tomato , Pe…☆14Jul 19, 2023Updated 2 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆46Apr 15, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆16Jul 5, 2017Updated 8 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Jan 14, 2019Updated 7 years ago
- Stanford CS234, 2018☆10Mar 23, 2018Updated 8 years ago
- Predict, Manage and Monitor the call drops of cell towers using Cloud Pak for Data☆10Mar 16, 2021Updated 5 years ago
- List of useful resources for AI in medicine - datasets, companies, papers, etc☆10Feb 26, 2018Updated 8 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Entity/Relation/Event extraction on ACE 2005 corpus☆14Mar 26, 2019Updated 7 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- My Solutions to Programming Assignments from the Improving Deep Neural Networks: Hyperparameter tuning, Regularization and Optimization c…☆11Jul 5, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tutorial for applying machine learning to text data within healthcare☆12May 12, 2023Updated 2 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago