๐Ÿ›ก๏ธ ZeroPhish Gate

AI-Powered Phishing & Threat Detection

Analyze messages, emails, and documents for potential security threats

Status: ๐ŸŸข System Ready

๐Ÿ‘ค Your Role
๐ŸŒ Language

๐Ÿ“œ Risk History Log

๐Ÿ“‚ Select Report to View

How to Use

  1. Paste or type the suspicious message in the text box
  2. Upload a file (PDF or TXT) if needed
  3. Select your role for personalized advice
  4. Click Analyze to get results

Threat Types

  • ๐ŸŸข Safe: No threats detected
  • ๐ŸŸก Spam: Unwanted promotional content
  • ๐ŸŸ  Suspicious: Potentially harmful content
  • ๐Ÿ”ด Phishing: Attempts to steal information
  • ๐Ÿ”ด Malware: Malicious software threats

Tips

  • Always verify suspicious requests through official channels
  • Never click links or download attachments from unknown senders
  • When in doubt, contact your IT security team

Hover over underlined blue terms in the analysis to see their definitions:

  • Phishing: A type of online scam where attackers trick you into giving away personal information
  • Domain Spoofing: When a fake website mimics a trusted one by using a similar-looking web address
  • Malware: Software designed to harm or gain unauthorized access to your device or data
  • Spam: Unwanted or unsolicited messages, usually advertisements or scams
  • Tone: The emotional tone in a message, like being urgent or friendly

Three-Stage Hybrid Analysis Pipeline:

  1. Stage 1 - BERT Model: Technical phishing pattern detection
  2. Stage 1.5 - RAG Reranking: LLaMA semantic reanalysis for intent understanding
  3. Stage 2 - Final Interpretation: User-friendly explanation generation

RAG-Based Reranking Benefits: โœ… Semantic Understanding: LLaMA analyzes intent and context, not just patterns โœ… Social Engineering Detection: Better detection of psychological manipulation โœ… Hybrid Decision Making: Combines pattern matching with contextual analysis โœ… Reduced False Positives: More accurate classification of legitimate messages

How It Works:

  • BERT identifies technical patterns (suspicious links, keywords, etc.)
  • LLaMA reanalyzes for social engineering, urgency, and intent
  • System combines both analyses for final classification
  • Prioritizes safety while reducing false alarms

Message Classification:

  • Safe: Normal, legitimate messages
  • Spam: Unwanted promotional content
  • Phishing: Attempts to steal personal information
  • Malware: Messages with malicious attachments or links