CERT-Polska / phishing-api
☆17Updated 4 years ago
Alternatives and similar repositories for phishing-api:
Users that are interested in phishing-api are comparing it to the libraries listed below
- Client library for the mwdb service by CERT Polska.☆40Updated 5 months ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- XOR Key Extractor☆50Updated 9 months ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- htpw is a project to increase the security of your WordPress!☆52Updated 7 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- sqlmap tamper script for unicode escape inside json☆12Updated 6 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- ☆30Updated 4 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆21Updated 5 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Simple DNS logging server☆18Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆29Updated 6 months ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- THOR APT Scanner User Manual☆18Updated last week
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Public Github Pages for Cisco☆14Updated 6 years ago
- Collaborative malware exchange repository.☆33Updated 5 months ago
- A ransomware group monitoring bot written in C#.☆56Updated 3 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆22Updated 4 years ago
- bash poc scripts to exploit open fpm ports☆60Updated 5 years ago