iosiro / blockphish
☆17Updated this week
Related projects: ⓘ
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 6 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 5 years ago
- dns logger for passive dns collection☆42Updated 12 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 7 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- suspect is a simple bash triage tool☆17Updated 6 years ago
- Invisible Watermarks with Space Characters in ASCII Files☆22Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated last year
- Phishing Toolkit☆19Updated 6 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆59Updated 5 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 5 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 7 years ago
- ☆16Updated this week
- Pentest environment scaffolding. Supporting role in Kali Linux.☆11Updated 4 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- A tool to triage screenshots☆19Updated 7 years ago
- ☆27Updated this week
- A Passive DNS backend and collector☆31Updated 2 years ago
- Fun with Amazon AWS and Maltego☆28Updated 7 years ago
- Suite for Information gathering☆12Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 7 years ago
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- ☆24Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago