anvilsecure / hominoidLinks
Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.
☆10Updated 3 years ago
Alternatives and similar repositories for hominoid
Users that are interested in hominoid are comparing it to the libraries listed below
Sorting:
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Updated 3 years ago
- ☆30Updated 4 years ago
- Minimal Indicator Storage System☆11Updated 5 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 4 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 5 years ago
- ☆14Updated last month
- Collection of Semgrep rules for security analysis☆10Updated last year
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆48Updated this week
- Static Token And Credential Scanner☆95Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 4 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 7 years ago
- ☆22Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Data Scientists Go To Jupyter☆68Updated 11 months ago
- ☆16Updated 5 years ago
- egrets monitors egress☆46Updated 5 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Updated 5 years ago
- ☆14Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year
- Open YARA scan- and search engine☆25Updated 11 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- #INFILTRATE19 raptor's party pack.☆33Updated 3 months ago