Homographs: brutefind homographs within a font
☆19Apr 21, 2017Updated 8 years ago
Alternatives and similar repositories for homographs
Users that are interested in homographs are comparing it to the libraries listed below
Sorting:
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- NOISE creates "real-looking" text based upon a collection of reference texts, which can then be used in emails, tweets, web searches, IRC…☆15Apr 7, 2015Updated 10 years ago
- The front end Angular repository for Unfetter-Discover☆15Dec 26, 2018Updated 7 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- ☆16Sep 26, 2016Updated 9 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Resources for SANS CTI Summit 2020 presentation☆20Dec 24, 2019Updated 6 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Whos On First admin data for US, homepage: https://whosonfirst.org☆20Oct 10, 2025Updated 4 months ago
- Tensorflow Phishing Domains Example☆23Jun 28, 2018Updated 7 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Entrada - A tool for DNS big data analytics☆50Aug 7, 2024Updated last year
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- ☆18Apr 16, 2015Updated 10 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- ☆24Sep 12, 2024Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 4 months ago
- ☆23Apr 11, 2024Updated last year
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Python script for downloading Kaltura videos from Toledo☆10Nov 15, 2022Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- ☆31Feb 27, 2026Updated last week
- DNS CAA inspection CLI and (Go) library.☆66Jan 9, 2026Updated last month
- Dataplane.org server hosting providers☆30Sep 16, 2025Updated 5 months ago
- Pure Python SSL, TLS and DTLS library☆36Mar 4, 2018Updated 8 years ago