anvilsecure / hominoidLinks
Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.
☆11Updated 3 years ago
Alternatives and similar repositories for hominoid
Users that are interested in hominoid are comparing it to the libraries listed below
Sorting:
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 5 years ago
 - ☆30Updated 4 years ago
 - Salesforce Policy Deviation Checker☆30Updated 5 years ago
 - An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
 - Collection of Semgrep rules for security analysis☆11Updated last year
 - A tool for auditing medical devices and healthcare infrastructure☆21Updated 2 years ago
 - #INFILTRATE19 raptor's party pack.☆32Updated last year
 - ☆16Updated 5 years ago
 - A Platform for Testing Secure Coding/Config☆19Updated 6 years ago
 - CTF tasks created☆11Updated 2 years ago
 - Some of the presentations given by me☆19Updated 2 months ago
 - ☆22Updated 4 years ago
 - Minimal Indicator Storage System☆11Updated 4 years ago
 - Tricard - Malware Sandbox Fingerprinting☆20Updated last year
 - Use Markov Chains to obfuscate data as other data☆55Updated 9 years ago
 - Zone transfers for rwhois☆20Updated 6 years ago
 - This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
 - Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆28Updated 3 weeks ago
 - Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
 - Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year
 - Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
 - Static Token And Credential Scanner☆95Updated 2 years ago
 - DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
 - A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
 - Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
 - The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
 - WStalker: an easy proxy☆25Updated 5 years ago
 - Public repository for Red Canary Research☆37Updated 5 years ago
 - python wrapper to use tshark for file extraction from the command line.☆26Updated 6 years ago
 - Collect chrome extensions from various devices and find out if they are malicious☆24Updated 2 months ago