Monitor Certificate Transparency Logs For Phishing Domains
☆23Nov 19, 2018Updated 7 years ago
Alternatives and similar repositories for stinkyphish
Users that are interested in stinkyphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆327Sep 11, 2024Updated last year
- ☆12Jan 13, 2018Updated 8 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- PhishDetect is a library to help identify phishing pages☆108May 11, 2023Updated 2 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Oct 11, 2017Updated 8 years ago
- ☆12Sep 4, 2013Updated 12 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 12 years ago
- An npm package to defang and refang IoC☆13Apr 11, 2026Updated 3 weeks ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Jan 15, 2019Updated 7 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated last year
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SMTP server / sinkhole for collecting spam☆46Jul 30, 2018Updated 7 years ago
- Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)☆16Nov 11, 2019Updated 6 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆56Aug 30, 2018Updated 7 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 7 months ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- Zimbra邮件系统漏洞 XXE/RCE/SSRF/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)☆78Feb 22, 2023Updated 3 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- This repo contains Automation scripts which can be used in CTFs and Real world.☆20Jun 5, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- ☆18Jan 20, 2021Updated 5 years ago
- Malice Yara Plugin☆29Sep 8, 2019Updated 6 years ago
- Little directed graph with backlink support.☆11Nov 19, 2015Updated 10 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago