本列表收录互联网上常见的恶意网站网址。This list contains URLs of malicious websites commonly found on the Internet.
☆46Jan 21, 2018Updated 8 years ago
Alternatives and similar repositories for CN-Malicious-website-list
Users that are interested in CN-Malicious-website-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 基于url特征的轻量级的恶意页面检测☆21Jul 3, 2017Updated 8 years ago
- 中文恶意网页检测数据集与检测方法☆21Mar 4, 2025Updated last year
- Identify synthetic domain names using Random Forrest Classifier☆13Jun 4, 2024Updated last year
- 基于深 度学习对dga恶意域名检测研究☆57Dec 8, 2022Updated 3 years ago
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆21Aug 19, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Collected dataset of DGA domains and Alexa domains. Used for experiments in automatic DGA domains classification.☆20Apr 16, 2022Updated 4 years ago
- 人文历史知识图谱 三元组涵盖历史/文学/地理/军事/政治/艺术/科学技术史等学科领域 人物关系网络☆19Sep 4, 2025Updated 8 months ago
- Linux Desktop Test Project (LDTP) Library for Robot Framework.☆11Aug 3, 2017Updated 8 years ago
- An evaluation bentchmark for classical Chinese☆19Dec 13, 2023Updated 2 years ago
- Implement attention model to LSTM using TensorFlow☆10Jul 3, 2018Updated 7 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- Tools for working with robot framework☆23Jun 13, 2014Updated 11 years ago
- Android Template Application to Demonstrate a number of Best Practises around Mobile Security☆10May 10, 2018Updated 8 years ago
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Chinavis2018挑战1一等奖作品-基于内网的威胁情报可视分析☆40Dec 10, 2022Updated 3 years ago
- python+Selenium爬虫:模拟登录+自动点击☆12Dec 11, 2017Updated 8 years ago
- Virtual service to help secure IoT devices☆12Aug 17, 2017Updated 8 years ago
- 中文姓名与性别的相关性分析☆13May 16, 2016Updated 9 years ago
- Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishi…☆60Jun 1, 2021Updated 4 years ago
- 自用Rules / 规则:Surge / Shadowrocket / Quantumult☆14Feb 10, 2026Updated 3 months ago
- JSON Schema validation library for Robot Framework☆10Jul 2, 2019Updated 6 years ago
- y-trainerY-Trainer 是一个LLM模型微调训练框架。 📊 核心优势: 📉 精准对抗过拟合: 专门优化,有效解决SFT中的过拟合难题。 🧩 突破遗忘瓶颈: 无需依赖通用语料,即可卓越地保留模型的泛化能力,守住核心竞争力的同时实现专项提升!🏆☆44Mar 3, 2026Updated 2 months ago
- A collection of datafiles created from the library of congress open data dump☆20May 19, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PHP 必应图片 API☆11Apr 6, 2025Updated last year
- Winlay is a free and open-source app developed by A3X. It allows you to download Windows, Android, and Linux files that can be used to te…☆20Sep 29, 2025Updated 7 months ago
- 在信息化时代,互联网中存储着海量多模态、多类型的资源。这些资源中包含了大量网络公害数据,例如黄赌毒、电信诈骗、网络敲诈、网络谣言、虚假新闻等。其中,数据的载体包括文本、图像、音频、视频,并且以非结构化或者半结构化形式存在。构建面向网络公害治理的知识图谱的任务是对这些海量多模…☆12Jul 13, 2022Updated 3 years ago
- 使用LSTM模型检测DGA域名☆42Dec 30, 2019Updated 6 years ago
- AVR USB HID Bootloader that protects against malicious firmware upgrades☆13Apr 13, 2016Updated 10 years ago
- A free ad-blocking and privacy focused DNS over HTTPS service.☆11Apr 22, 2026Updated 2 weeks ago
- 把 cubox 稍后读软件的「归档」内容转存到其他地方(如Notion),以突破其只能存200条数据的限制☆11Dec 31, 2024Updated last year
- 专家系统大作业☆23Jun 15, 2021Updated 4 years ago
- 【持续维护更新】微信公众号airkiss配网以及近场发现功能在esp8266 rtos3.1 sdk的实现。☆14Oct 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 2018达观杯文本智能处理挑战赛☆16Nov 14, 2018Updated 7 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- Rust port of TLSH☆14Oct 12, 2025Updated 6 months ago
- 用python写自己的第一个区块链☆12Mar 5, 2018Updated 8 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 3 months ago
- 从 minecraft 中文 wiki 生成供 fcitx5 使用的拼音词库☆15Updated this week