shaeferd / Phishing-DetectionLinks
Phishing Detection System using Natural Language Processing and Machine Learning
☆11Updated 3 years ago
Alternatives and similar repositories for Phishing-Detection
Users that are interested in Phishing-Detection are comparing it to the libraries listed below
Sorting:
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆17Updated 6 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Updated 6 years ago
- Machine Learning for Phishing Website Detection☆56Updated 5 years ago
- Detect email phishing with Watson Natural Language Classifier☆37Updated 3 years ago
- ☆42Updated 3 years ago
- Recent cyber attacks reports & interesting analysis files☆15Updated 3 years ago
- ☆14Updated 4 years ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Updated 2 years ago
- detecting phishing websites using machine learning☆45Updated 3 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆48Updated 2 years ago
- ☆16Updated 8 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 10 months ago
- Experiments to detect phishing websites using neural networks☆23Updated 6 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- The Advanced Automated Pentesting And Forensics Tool☆27Updated 2 years ago
- ☆12Updated 2 years ago
- Various components we use in labs☆10Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Updated 7 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Updated 5 years ago
- This project has all the components which you can use to clone yourself over digital channel☆55Updated 5 years ago
- Collection of various materials on operational security.☆22Updated 9 years ago
- Python Digital Forensics Cookbook by Packt☆17Updated 5 years ago
- Examples of linear regression, logistic regression, and deep learning implementations such as Transformers, gans, cnns, rnns, and more us…☆99Updated 11 months ago
- THP Forensic Challenges☆23Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Machine Learning For Cybersecurity.☆68Updated 6 years ago