shaeferd / Phishing-DetectionLinks
Phishing Detection System using Natural Language Processing and Machine Learning
☆11Updated 3 years ago
Alternatives and similar repositories for Phishing-Detection
Users that are interested in Phishing-Detection are comparing it to the libraries listed below
Sorting:
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆17Updated 6 years ago
- Machine Learning for Phishing Website Detection☆56Updated 5 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Updated 6 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆48Updated 2 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Updated 4 years ago
- ☆24Updated 4 years ago
- Machine Learning For Cybersecurity.☆69Updated 6 years ago
- Website defacement attack detection with deep learning☆62Updated last year
- ☆16Updated 9 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- THP Forensic Challenges☆23Updated 2 years ago
- The Advanced Automated Pentesting And Forensics Tool☆27Updated 2 years ago
- This is an End-to-End Machine Learning Project which focuses on phishing websites to classify phishing and legitimate ones. Particularly,…☆33Updated 2 years ago
- Detect email phishing with Watson Natural Language Classifier☆37Updated 4 years ago
- detecting phishing websites using machine learning☆45Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- ☆14Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆32Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆40Updated 7 years ago
- ☆12Updated 2 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 3 years ago
- intrusion detection☆25Updated 8 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10Updated 8 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Updated 5 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 6 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago