-
Notifications
You must be signed in to change notification settings - Fork 23
/
Copy pathREADME.md
101 lines (54 loc) · 3.1 KB
/
README.md
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
## Malicious URL Detector
**Malicious URL Detector** 
**CONCEPT VIDEO 👇**
[](https://www.youtube.com/watch?v=-6fd996HWrQ)
#### Updated Application at: https://mudvfinalradar.eu-gb.cf.appdomain.cloud/
This application is live at https://malicious-url-detectorv5.herokuapp.com/
Android application repository URL : https://github.com/abhisheksaxena1998/Android-Application-Malicious-URL-Detector
APK URL : https://github.com/abhisheksaxena1998/Android-Application-Malicious-URL-Detector/blob/master/Malicious%20URL%20Detector.apk
Life is dependent mainly on internet in todays life for moving business online, or making online transactions. Resulting in cyber-thefts and cyber-frauds increasing exponentially day by day, leading to compromised security and infiltration of hackers or third parties while transacting online.
## Test Data
Test URL | Result (Target)
------------ | -------------
https://home-paypal-jp.moonkahonda.com/panel_JP/-/jp/xppl/ | Malicious
https://galsterberg.panomax.com/ | Legitimate
https://oberstdorf.panomax.com/schrattenwang | Legitimate
https://addons.mozilla.org/de/firefox/addon/mynthos-tv/?src=search | Legitimate
http://ord-amazsn.com | Malicious
http://ww17.login-appleid.apple.com.alert-wode.com/ | Malicious
http://support.facebook.com-uuynqiyacp.tekhencorp.com/ | Malicious
https://galsterberg.panomax.com/ | Legitimate
https://www.google.com/ | Legitimate
https://wallpapersite.com/abstract/ | Legitimate
https://www.freepik.com/free-vector | Legitimate
## Installation Guide.
1. Extract Malicious-Urlv5 zip file.
2. Inside Malicious-Urlv5 there is a file requirements.txt
3. Open command prompt in Malicious-Urlv5 folder

4. Type following command in cmd

5. Dependencies will start installing.


6. To run the code, write following command in terminal.
python manage.py runserver

7. Type http://127.0.0.1:8000/ in URL bar of browser and press Enter. Machine Learning powered Web Application will start.

8. Type a valid URL for example to fetch analysis:
https://www.mi.com
This is an example of Legitimate URL.

9. Another example of Legitimate URL
https://technoutsav.techgig.com/

10. Another Legitimate URL
https://www2.deloitte.com/in/en.html

11. Example of Malicious Website
http://www.dhilloncraneservice.com/.well-known/bankofamerica.com/

12. Another Malicious URL
https://home-paypal-jp.moonkahonda.com/panel_JP/-/jp/xppl/
