anvilsecure / hominoid
Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for hominoid
- Manticore's Public Threats Repository☆10Updated 4 years ago
- An automated setup for fuzzing Redis w/ AFL++☆30Updated 2 years ago
- ☆13Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated 10 months ago
- #INFILTRATE19 raptor's party pack.☆30Updated 10 months ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆17Updated 2 years ago
- ☆13Updated 4 years ago
- Collection of red machine learning projects☆39Updated 3 years ago
- ☆10Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- The Multiplatform Linux Sandbox☆15Updated 10 months ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- A Platform for Testing Secure Coding/Config☆18Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- The Dumb Network Fuzzer☆19Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Minimal Indicator Storage System☆11Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- ☆22Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated 7 months ago
- ☆10Updated 3 years ago
- ☆31Updated 3 years ago
- various slides and presentations I've worked on☆18Updated 8 months ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- details about DIAL protocol vulnerabilities☆27Updated 11 months ago
- ☆17Updated 7 months ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆21Updated 6 months ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago