Tool to analyze and detect MITM phishing toolkits on the web.
☆83Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for phoca
Users that are interested in phoca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Oct 21, 2022Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 9 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆192Apr 24, 2025Updated last year
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Golang based web service to scan files with yara rules☆25Jul 6, 2017Updated 8 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Aug 26, 2020Updated 5 years ago
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Aug 4, 2018Updated 7 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- ☆20Apr 10, 2025Updated last year
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 6 years ago
- Scripts for TheHive.☆23Nov 15, 2019Updated 6 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- Hatching Triage public command-line utility and API library.☆76Oct 9, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exposing phishing kits seen from phishunt.io☆267Jun 13, 2025Updated 10 months ago
- ☆13Jan 12, 2022Updated 4 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Vault of Windows Registry forensic artifacts☆30Nov 12, 2025Updated 5 months ago
- ☆15May 22, 2023Updated 2 years ago
- A Go implementation of JARM☆119Jun 14, 2022Updated 3 years ago
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Jan 22, 2023Updated 3 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 11 months ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Code listing for the paper 'SATAR: A Self-supervised Approach to Twitter Account Representation Learning and its Application in Bot Detec…☆10Nov 1, 2021Updated 4 years ago
- Download all of a given user's public Pastebin pastes☆33Apr 16, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 11 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆129Sep 24, 2023Updated 2 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Uncover the full name of a target on Linkedin.☆162May 27, 2022Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago