Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps orgs investigate phishing campaigns, gauge third-party risk & mitigate these risks. All orgs on the list are exposed to higher risk of threat actors gaining initial entry to their org, supply chain, and customers.
☆21May 1, 2023Updated 2 years ago
Alternatives and similar repositories for Phishable
Users that are interested in Phishable are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Apr 2, 2022Updated 4 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- A very simple tool that generates multiple spellings of a phone number (to effectively search for it using the OR operator and quotes)☆21Dec 30, 2021Updated 4 years ago
- ☆20Jan 19, 2023Updated 3 years ago
- ☆22Dec 30, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This simple tool helps save a lot of time when gathering information about geolocation. Enter latitude and longitude once and click the b…☆28Mar 25, 2024Updated 2 years ago
- The list of write-ups, articles, and PoC of various interesting in context of OSINT☆24Mar 13, 2025Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Quick Cache and Archive search buttons☆38May 11, 2024Updated last year
- A list of hashtags that bots automatically retweet. Use them to increase the reach of your tweets and increase the number of followers on…☆16Dec 13, 2021Updated 4 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆20Jan 9, 2026Updated 3 months ago
- Enter the domain name once and gather information about it with 33 tools☆50Sep 7, 2023Updated 2 years ago
- GREP FOR OSINT is a set of very simple shell scripts that will help you quickly analyze a text or a folder with files for data useful for…☆119Mar 5, 2023Updated 3 years ago
- A fast GitHub stargazers information gathering tool☆72Mar 2, 2022Updated 4 years ago
- Lightweight username enumeration tool that checks the availability of a specified username on over 200 websites.☆44May 25, 2022Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Automate converting webshells into reverse shells.☆72Mar 16, 2026Updated 3 weeks ago
- async parser for JET☆25Nov 14, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆750Dec 8, 2025Updated 4 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Maltego transformation for TON investigations☆24Jan 1, 2024Updated 2 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 7 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- A simple javascript tool to prepare possible name and login search patterns with links.☆65Nov 1, 2024Updated last year
- 5 Google Custom Search Engines for searching in 48 pastebin sites☆142Mar 25, 2024Updated 2 years ago
- Cyber Detective Github profile README☆54Jan 5, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Jun 2, 2022Updated 3 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- Intelligence tramite - Immagini - Video - Strumenti - Mappe☆134Aug 8, 2025Updated 8 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- reveal origins behind reverse proxies & hidden services☆37Aug 23, 2025Updated 7 months ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆22Mar 18, 2026Updated 3 weeks ago