Credential Phish Analysis and Automation
☆99Aug 22, 2018Updated 7 years ago
Alternatives and similar repositories for DATA
Users that are interested in DATA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find phishing kits which use your brand/organization's files and image.☆241Jan 21, 2019Updated 7 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 10 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Nov 4, 2022Updated 3 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- DPS' Lightweight Investigation Notebook☆434Dec 31, 2023Updated 2 years ago
- Fun with Amazon AWS and Maltego☆30Jun 5, 2017Updated 8 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 9 years ago
- BGP Hijack Detection☆117Feb 14, 2018Updated 8 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆367May 21, 2024Updated 2 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Malware/IOC ingestion and processing engine☆110Nov 20, 2018Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆269Mar 7, 2021Updated 5 years ago