anvilsecure / hominoidLinks
Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.
☆11Updated 3 years ago
Alternatives and similar repositories for hominoid
Users that are interested in hominoid are comparing it to the libraries listed below
Sorting:
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 4 years ago
- ☆30Updated 4 years ago
- This repository shows the prompts we used for each agent in CVE-Genie☆23Updated 4 months ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 10 months ago
- ☆22Updated 4 years ago
- ☆23Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- ☆14Updated 3 months ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Some of the presentations given by me☆19Updated 2 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Updated 5 years ago
- Data Scientists Go To Jupyter☆66Updated 7 months ago
- A tool for auditing medical devices and healthcare infrastructure☆21Updated 2 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- egrets monitors egress☆46Updated 5 years ago