olihough86 / stinkyphishView external linksLinks
Monitor Certificate Transparency Logs For Phishing Domains
☆24Nov 19, 2018Updated 7 years ago
Alternatives and similar repositories for stinkyphish
Users that are interested in stinkyphish are comparing it to the libraries listed below
Sorting:
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆326Sep 11, 2024Updated last year
- An npm package to defang and refang IoC☆12Sep 7, 2025Updated 5 months ago
- ☆12Jan 13, 2018Updated 8 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Aug 30, 2018Updated 7 years ago
- PhishDetect is a library to help identify phishing pages☆108May 11, 2023Updated 2 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- This repo contains Automation scripts which can be used in CTFs and Real world.☆20Jun 5, 2021Updated 4 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)☆16Nov 11, 2019Updated 6 years ago
- ☆17Jan 20, 2021Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Jan 15, 2019Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- Ghost Mail iOS app to manage Cloudflare email aliases☆33Updated this week
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- OSINT-compass is a powerful tool for collecting, organizing, and analyzing open-source information from various sources.☆17Apr 26, 2023Updated 2 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 8 years ago
- ☆21Nov 6, 2018Updated 7 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 5 months ago
- ☆98Feb 21, 2019Updated 6 years ago
- Go tool to perform DNS rebinding☆24Nov 1, 2018Updated 7 years ago
- Malice Yara Plugin☆30Sep 8, 2019Updated 6 years ago
- Python PCAP Examiner☆25May 14, 2021Updated 4 years ago