dutchcoders / homographsView external linksLinks
Homographs: brutefind homographs within a font
☆19Apr 21, 2017Updated 8 years ago
Alternatives and similar repositories for homographs
Users that are interested in homographs are comparing it to the libraries listed below
Sorting:
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- NOISE creates "real-looking" text based upon a collection of reference texts, which can then be used in emails, tweets, web searches, IRC…☆15Apr 7, 2015Updated 10 years ago
- The front end Angular repository for Unfetter-Discover☆15Dec 26, 2018Updated 7 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- List of crackpot 'scientists' and 'thinkers'☆20Jun 22, 2025Updated 7 months ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Whos On First admin data for US, homepage: https://whosonfirst.org☆20Oct 10, 2025Updated 4 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- Entrada - A tool for DNS big data analytics☆50Aug 7, 2024Updated last year
- ☆18Apr 16, 2015Updated 10 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 3 months ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- ☆23Apr 11, 2024Updated last year
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- ☆30Feb 2, 2026Updated last week
- Go implementation of Unicode TR39 skeleton algorithm☆34Feb 1, 2021Updated 5 years ago
- Pure Python SSL, TLS and DTLS library☆36Mar 4, 2018Updated 7 years ago
- Dataplane.org server hosting providers☆30Sep 16, 2025Updated 4 months ago
- Binaries for the log2timeline projects and dependencies☆40Updated this week
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 4 months ago
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆35Jul 20, 2023Updated 2 years ago
- Nmap Script to scan for Winnti infections☆71May 22, 2018Updated 7 years ago
- A modern Python-3-based alternative to RegRipper☆205Mar 31, 2025Updated 10 months ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago