duo-labs / phinn
A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.
☆131Updated 7 years ago
Alternatives and similar repositories for phinn:
Users that are interested in phinn are comparing it to the libraries listed below
- Dashboard to collect, analyze, and respond to reported phishing emails.☆285Updated last year
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Common Vulnerabilities and Exposures - Portal☆84Updated 7 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Automatic firewall rule orchestator.☆82Updated 7 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- Threatbutt python client and Maltego transforms☆51Updated 7 months ago
- It's like a polaroid, but for domains☆24Updated 9 years ago
- DNSDB query scripts☆75Updated 5 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 6 years ago
- The NoSQL Honeypot Framework☆101Updated last year
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆142Updated 2 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Internet data acquisition☆149Updated 4 years ago
- ☆64Updated 2 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 5 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- A regex based source code scanner.☆129Updated 7 years ago
- Passive DNS collection using Zeek☆182Updated last year
- a low-interaction honeypot☆94Updated 7 years ago
- Threat Intelligence APIs☆275Updated last year
- Docker container for MISP☆96Updated 6 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- A finder of domain typos showing country of IP address☆166Updated last year
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 3 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- threat language parser☆61Updated 9 years ago