Monitor Certificate Transparency Logs For Phishing Domains
☆23Nov 19, 2018Updated 7 years ago
Alternatives and similar repositories for stinkyphish
Users that are interested in stinkyphish are comparing it to the libraries listed below
Sorting:
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆327Sep 11, 2024Updated last year
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- PhishDetect is a library to help identify phishing pages☆108May 11, 2023Updated 2 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆56Aug 30, 2018Updated 7 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Oct 11, 2017Updated 8 years ago
- This repo contains Automation scripts which can be used in CTFs and Real world.☆20Jun 5, 2021Updated 4 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- ☆17Jan 20, 2021Updated 5 years ago
- Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)☆16Nov 11, 2019Updated 6 years ago
- OSINT-compass is a powerful tool for collecting, organizing, and analyzing open-source information from various sources.☆17Apr 26, 2023Updated 2 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Ghost Mail iOS app to manage Cloudflare email aliases☆34Feb 18, 2026Updated 2 weeks ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- ☆21Nov 6, 2018Updated 7 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 5 months ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- 同一局域网内网站源码监控、webshell检测总控端☆23Mar 3, 2018Updated 8 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Go tool to perform DNS rebinding☆24Nov 1, 2018Updated 7 years ago
- Malice Yara Plugin☆30Sep 8, 2019Updated 6 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Python PCAP Examiner☆25May 14, 2021Updated 4 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Mar 4, 2021Updated 5 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago