srimani-programmer / Phishing-URL-DetectorView external linksLinks
A Flask Based Web Application which is used to detect the phishing URL's.
☆11Nov 27, 2019Updated 6 years ago
Alternatives and similar repositories for Phishing-URL-Detector
Users that are interested in Phishing-URL-Detector are comparing it to the libraries listed below
Sorting:
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Telegram phishing is for testing purposes only and the security of users is responsible for any misuse☆10Feb 20, 2021Updated 4 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated last year
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Detect email phishing with Watson Natural Language Classifier☆37Jan 7, 2022Updated 4 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 6 years ago
- ☆13Aug 18, 2023Updated 2 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Detects support for Cross-Origin Resource Sharing☆20Oct 8, 2018Updated 7 years ago
- A python script to try and download as many fabric mods on a mcversion Modrinth☆10Feb 25, 2022Updated 3 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 8 months ago
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Feb 2, 2026Updated last week
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- ☆10Mar 26, 2022Updated 3 years ago
- This app helps the farmers to convert from a food crop to a commercial crop by providing a full fledged cost and risk analysis.☆10Nov 4, 2018Updated 7 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- VS Code extension for handling python module names☆10Aug 10, 2022Updated 3 years ago
- ☆11Oct 20, 2018Updated 7 years ago
- ☆12Jan 22, 2026Updated 3 weeks ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 3 years ago
- ☆12Feb 16, 2024Updated last year
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 8 years ago
- Personal Depersonalization System☆10Jan 30, 2016Updated 10 years ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Nov 5, 2023Updated 2 years ago
- A CLI client for Revolt.☆10Jun 24, 2021Updated 4 years ago
- ☆13Apr 16, 2025Updated 9 months ago
- Rajagiri connect is a networking platform that enables the students of Rajagiri to form a social network among themselves, enabling them …☆13Sep 11, 2022Updated 3 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago