Visualize networks of phishing by querying the phishstats.info API
☆79Aug 12, 2024Updated last year
Alternatives and similar repositories for phishstats-api-network
Users that are interested in phishstats-api-network are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Make Google Dork with firefox addon☆18Dec 20, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- This bot will automatically change your name based on your twitter followers (Written in Python)☆13Jul 10, 2020Updated 5 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆36Jan 22, 2025Updated last year
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Mar 19, 2026Updated last week
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Dec 29, 2023Updated 2 years ago
- Ansible Collection☆12Apr 22, 2025Updated 11 months ago
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆32Jan 21, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆28Dec 27, 2025Updated 3 months ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆64Dec 20, 2025Updated 3 months ago
- A payment application to demonstrate real-world usage of Cypress testing methods, patterns, and workflows.☆10Jan 23, 2021Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated last year
- ☆23Mar 17, 2024Updated 2 years ago
- ☆23Feb 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 8 months ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 8 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Jupyter Notebooks for the Blue Team☆40Jan 16, 2025Updated last year
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated 2 weeks ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Feb 10, 2022Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Useful for digital forensics investigations or initial black-box pentest footprinting.☆149Jun 15, 2021Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆58Jun 13, 2024Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆62Updated this week
- Android Malware Tracker☆28Apr 7, 2024Updated last year
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- ☆18Jan 14, 2026Updated 2 months ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year