Visualize networks of phishing by querying the phishstats.info API
☆79Aug 12, 2024Updated last year
Alternatives and similar repositories for phishstats-api-network
Users that are interested in phishstats-api-network are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Make Google Dork with firefox addon☆18Dec 20, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- ☆36Jan 22, 2025Updated last year
- cryptam document malware analysis tool☆13Jun 18, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of Python resources for Blue Team security work☆17Sep 23, 2018Updated 7 years ago
- ☆21Feb 20, 2014Updated 12 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆12Oct 29, 2021Updated 4 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Apr 28, 2026Updated last week
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Sep 21, 2020Updated 5 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Dec 29, 2023Updated 2 years ago
- Ansible Collection☆12Apr 22, 2025Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆32Jan 21, 2026Updated 3 months ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 3 months ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆28Dec 27, 2025Updated 4 months ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆67Dec 20, 2025Updated 4 months ago
- A jupyter notebook that contains the main commands executed during a penetration test☆73Sep 24, 2020Updated 5 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 6 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 5 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 10 months ago
- The scripts I write to help me on my bug bounty hunting☆125Jan 8, 2022Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 10 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆454May 27, 2019Updated 6 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 months ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- THOR APT Scanner User Manual☆21May 2, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Feb 10, 2022Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Useful for digital forensics investigations or initial black-box pentest footprinting.☆151Jun 15, 2021Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆58Jun 13, 2024Updated last year
- Android Malware Tracker☆28Apr 7, 2024Updated 2 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago