Backup of my phishing regular expression testing bench
☆151Mar 20, 2017Updated 8 years ago
Alternatives and similar repositories for PhishingRegex
Users that are interested in PhishingRegex are comparing it to the libraries listed below
Sorting:
- Exchange Transport rules to detect and enable response to phishing☆418May 9, 2020Updated 5 years ago
- A batch script to demonstrate complex Microsoft Office deployments☆92May 10, 2018Updated 7 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Apr 13, 2020Updated 5 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆616Aug 17, 2024Updated last year
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 5 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Sysmon configuration file template with default high-quality event tracing☆5,410Jul 3, 2024Updated last year
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆327Sep 11, 2024Updated last year
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Oct 24, 2021Updated 4 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Aug 10, 2018Updated 7 years ago
- ☆55Mar 2, 2022Updated 4 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- Rapid Assessment of Web Resources☆19Nov 11, 2016Updated 9 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last week
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- A repository for using windows event forwarding for incident detection and response☆1,299Sep 8, 2025Updated 5 months ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆294Aug 1, 2023Updated 2 years ago
- Phishing toolkit for red teams and pentesters.☆126Jun 1, 2018Updated 7 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Mar 27, 2023Updated 2 years ago
- IR-Tools - PowerShell tools for IR☆130Jul 10, 2017Updated 8 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Bro/Zeek integration with osquery☆93Nov 2, 2020Updated 5 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago