A Dataset for the task of Malicious URL Detection
☆20Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for Malicious-URL-Detection-using-Machine-Learning
Users that are interested in Malicious-URL-Detection-using-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆36Feb 26, 2018Updated 8 years ago
- Detecting malicious URLs using Machine Learning☆29Oct 30, 2018Updated 7 years ago
- Applying text model to Detection Task☆74May 9, 2017Updated 8 years ago
- ☆54Jul 24, 2018Updated 7 years ago
- Diabetes is a medical condition that is caused due to insufficient production and secretion of insulin from the pancreas in case of Type-…☆19Sep 30, 2018Updated 7 years ago
- Collection of cyber security and "AI" relevant topics☆73Jan 1, 2018Updated 8 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆273Aug 12, 2022Updated 3 years ago
- AI: Deep Learning for Phishing URL Detection☆55Dec 8, 2022Updated 3 years ago
- Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishi…☆60Jun 1, 2021Updated 4 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆173Jan 12, 2021Updated 5 years ago
- Malicious Web Sites Detection using Suspicious URL☆76Oct 2, 2020Updated 5 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆10Jun 13, 2024Updated last year
- ☆13Feb 26, 2021Updated 5 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- Chrome Extension - Youtube keyboard shortcut collection☆15Jun 2, 2017Updated 8 years ago
- 地图选点一键导出公交到达圈的小工具☆10Apr 4, 2022Updated 3 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- ☆11Sep 23, 2020Updated 5 years ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- Docker Compose Postgres Multiple Databases☆10Sep 5, 2020Updated 5 years ago
- Controlling Traffic Lights Using Image Processing☆13Jun 19, 2018Updated 7 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- A website to generate statistics from last.fm data☆10Feb 7, 2017Updated 9 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Kaggle Competition : IEEE-CIS-Fraud-Detection☆10Jan 18, 2020Updated 6 years ago
- How to Get Started into Bug Bounty Complete Beginner Guide ( Part 1 Web Pentesting ) Hello guys, after a lot of requests and questions o…☆11May 30, 2021Updated 4 years ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- Object detection and classification☆12Oct 19, 2018Updated 7 years ago
- Redis RCE through Lua Sandbox Escape vulnerability☆10Sep 2, 2022Updated 3 years ago
- ☆10May 1, 2020Updated 5 years ago