shaeferd / Phishing-Detection
Phishing Detection System using Natural Language Processing and Machine Learning
☆12Updated 2 years ago
Alternatives and similar repositories for Phishing-Detection:
Users that are interested in Phishing-Detection are comparing it to the libraries listed below
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Updated 5 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Updated 5 years ago
- Machine Learning for Phishing Website Detection☆55Updated 4 years ago
- ☆15Updated 8 years ago
- This is an End-to-End Machine Learning Project which focuses on phishing websites to classify phishing and legitimate ones. Particularly,…☆26Updated last year
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆10Updated last year
- detecting phishing websites using machine learning☆43Updated 2 years ago
- Experiments to detect phishing websites using neural networks☆18Updated 5 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 8 months ago
- ☆24Updated 4 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆11Updated 4 years ago
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 2 years ago
- Public Code for ICS Evasion Attack Generation☆41Updated 3 years ago
- Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & …☆10Updated 4 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆46Updated last year
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 4 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Machine Learning applied to Cyber Security Course☆41Updated 5 years ago
- intrusion detection☆23Updated 7 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆22Updated 4 years ago
- Applied data science in cyber security☆22Updated 2 years ago
- Indian agricultural analysis☆11Updated 6 years ago
- Phishing URL Detection Tool☆12Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆94Updated 6 months ago
- ☆55Updated 6 years ago
- ☆26Updated 3 years ago