Backup of my phishing regular expression testing bench
☆151Mar 20, 2017Updated 9 years ago
Alternatives and similar repositories for PhishingRegex
Users that are interested in PhishingRegex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exchange Transport rules to detect and enable response to phishing☆414May 9, 2020Updated 5 years ago
- A batch script to demonstrate complex Microsoft Office deployments☆92May 10, 2018Updated 7 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Apr 13, 2020Updated 5 years ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆615Aug 17, 2024Updated last year
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- Sysmon configuration file template with default high-quality event tracing☆5,438Jul 3, 2024Updated last year
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Rapid Assessment of Web Resources☆19Nov 11, 2016Updated 9 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆327Sep 11, 2024Updated last year
- Credential Phish Analysis and Automation☆99Aug 22, 2018Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- A repository for using windows event forwarding for incident detection and response☆1,302Sep 8, 2025Updated 6 months ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Oct 11, 2017Updated 8 years ago
- ☆55Mar 2, 2022Updated 4 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Aug 10, 2018Updated 7 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Transparent network tap☆123Oct 7, 2015Updated 10 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Oct 24, 2021Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆201Dec 11, 2017Updated 8 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last month
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated 11 months ago
- IR-Tools - PowerShell tools for IR☆130Jul 10, 2017Updated 8 years ago
- Tools to create a Native Windows Audit Collection Platform. Active Directory example provided☆77Nov 5, 2019Updated 6 years ago