Proof-of-concept for phishing intelligence in Elastic
☆15Apr 30, 2019Updated 6 years ago
Alternatives and similar repositories for ElasticPhish
Users that are interested in ElasticPhish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 書籍「Python自然言語処理入門」用サポートサイト☆13Mar 25, 2020Updated 6 years ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 7 months ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.☆29Oct 26, 2023Updated 2 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Metamask strategy for Passport.js☆12Jul 13, 2018Updated 7 years ago
- Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys fil…☆18Aug 28, 2019Updated 6 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- The example code for the AI-web-application hands-on book, " Beginner’s Guide to AI Application Development with Nuxt.js, Python"☆17Dec 10, 2022Updated 3 years ago
- Automatically identify and extract potential anti-debugging techniques used by malware.☆28Nov 20, 2024Updated last year
- ☆16Jan 4, 2023Updated 3 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Network exploit detection using highly accurate pre-trained deep neural networks with Celery + Keras + Tensorflow + Redis☆22Dec 7, 2018Updated 7 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- A solution for using the ElastiFlow Unified Collector with the Elastic Stack (Elasticsearch and Kibana).☆26Nov 10, 2025Updated 4 months ago
- A low/zero interaction ssh authentication logging honeypot☆26Mar 8, 2026Updated 2 weeks ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- Graphical interface for @hasan-hasanov's ScoopBox: configure & launch Windows Sandbox.☆18Jun 27, 2022Updated 3 years ago
- The FASTEST way to consume threat intel.☆69May 10, 2023Updated 2 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- ☆23Jun 11, 2024Updated last year
- 🤖 Smart contracts built on top of Morpho Protocol to enable one-click leverage and strategies☆21Jun 17, 2023Updated 2 years ago
- A React component library that makes it easy to add p2p communication into components via LioWebRTC.☆17Dec 10, 2022Updated 3 years ago
- Cyber Threat Intelligence Feeds☆71May 3, 2024Updated last year
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- ☆31Dec 4, 2023Updated 2 years ago