duo-labs / phinn
A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.
☆131Updated 7 years ago
Alternatives and similar repositories for phinn:
Users that are interested in phinn are comparing it to the libraries listed below
- Dashboard to collect, analyze, and respond to reported phishing emails.☆290Updated last year
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 3 months ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- ☆90Updated 3 months ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- A regex based source code scanner.☆129Updated 8 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- A Framework for managing Cyber Threat Intelligence.☆5Updated 7 years ago
- Threat Intelligence APIs☆279Updated last year
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆84Updated last month
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Some IR notes☆73Updated 8 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 3 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆144Updated 2 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆80Updated 9 years ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Threatbutt python client and Maltego transforms☆51Updated 10 months ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year