GitHub RadarBlue team tool
AntiPhishing – Android + ML system for real-time, cross-app phishing URL interception. Analyzes links before opening, returns risk score (%) with explainable warnings using on-device heuristics + server-side ML. Primary language: Kotlin.
Project links:Open GitHub projectBack to radar
AntiPhishing is a mobile information security project that aims to identify Phishing links before the user opens them – in any application (SMS / WhatsApp / Email / Browser) – and display a risk score in percentage + a clear explanation to the user
Authors: Yahav Eliyahu, Ron Golan
---
Phishing attacks are one of the most common and dangerous security problems today. Thousands of users fall for attacks every day that start with a single click on a link that can appear anywhere, whether it's on WhatsApp, SMS, email, or social networks.
The main problem is that phishing doesn't always look dangerous. Sometimes the links look very similar to the original. They can differ by one character, for example, writing paypal with a 1 instead of an l. And sometimes they look really legitimate when the attackers use the names of well-known banks, companies, or services, and so there is no clear sign that it is a scam. Therefore, this phenomenon is really dangerous, especially for adults and people who do not understand technology.
In addition, most of the solutions currently available for phishing are focused on lists of malicious links that are currently known, such as Blacklist and Threat Intelligence database, and therefore do not protect against new links and therefore do not cope well with zero days.
---
Build a system that provides Proactive Protection:
(All before the damage happens, not after).
---
---
<p align="center"> <img src="diagram.jpg" alt="AntiPhishing general architecture flowchart" width="850" /> </p>
---
The system operates using a multi-layered pipeline to analyze and classify URLs in real time, in order to protect the user from phishing and other threats. The algorithm flow process is as follows:
The process is automatically triggered when the user clicks on a link in an external application (such as WhatsApp, SMS, or a browser). The system uses the Android Intent Filter to intercept the address and open as an intermediary before the browser.
At this stage, the system prepares the address for efficient and resource-saving comparison:
Depending on the results of the database check, the algorithm splits into one of two paths:
For unknown addresses, the engine calculates statistical features from the URL, including:
The features are fed into a pre-trained machine learning model. The model returns a classification (safe/suspicious) and a risk score.
Enforcement policy:
---
Android App
Backend
---
The project relies on a review of Blacklist, Heuristics and ML approaches to identify Phishing URLs, including the use of WHOIS information and feature combinations.
---
---
Project by: